CVE-2019-19459
📋 TL;DR
CVE-2019-19459 is a critical path traversal vulnerability in SALTO ProAccess SPACE that allows attackers to write arbitrary files to the server filesystem. This enables remote code execution by writing malicious files like web shells or auto-start scripts. Organizations using SALTO ProAccess SPACE 5.4.3.0 and potentially other versions are affected.
💻 Affected Systems
- SALTO ProAccess SPACE
📦 What is this software?
Proaccess Space by Saltosystem
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to complete system control, data theft, lateral movement within the network, and persistent backdoor installation.
Likely Case
Web shell deployment allowing remote command execution, data exfiltration, and potential ransomware deployment.
If Mitigated
Limited impact with proper network segmentation, file integrity monitoring, and restricted service accounts preventing privilege escalation.
🎯 Exploit Status
Exploit details and proof-of-concept code are publicly available on Packet Storm Security and other sources.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact SALTO Systems for specific patched version
Vendor Advisory: https://www.saltosystems.com/en/support/security-advisories/
Restart Required: Yes
Instructions:
1. Contact SALTO Systems support for latest security patches. 2. Backup configuration and data. 3. Apply provided patch. 4. Restart the ProAccess SPACE service. 5. Verify patch application.
🔧 Temporary Workarounds
Network Segmentation
allIsolate SALTO ProAccess SPACE server from internet and restrict internal network access
Web Application Firewall Rules
allBlock path traversal patterns and file write attempts to web interface
🧯 If You Can't Patch
- Immediately isolate the system from all networks including internet and internal corporate networks
- Implement strict file integrity monitoring on web root directory and system auto-start locations
🔍 How to Verify
Check if Vulnerable:
Check if running SALTO ProAccess SPACE version 5.4.3.0 or earlier via web interface or system information
Check Version:
Check web interface login page or system administration panel for version information
Verify Fix Applied:
Verify updated version from vendor and test that path traversal attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations in web root directory
- Path traversal patterns in web server logs
- Creation of .bat files in system directories
Network Indicators:
- HTTP requests containing '../' patterns to write endpoints
- Unusual outbound connections from SALTO server
SIEM Query:
source="SALTO_web_logs" AND (uri="*../*" OR method="POST" AND uri="*/write*" OR status=200 AND uri="*.bat" OR uri="*.php")
🔗 References
- https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html
- https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/
- https://packetstormsecurity.com/files/155525/SALTO-ProAccess-SPACE-5.5-Traversal-File-Write-XSS-Bypass.html
- https://sec-consult.com/en/blog/advisories/multiple-critical-vulnerabilities-in-salto-proaccess-space/