CVE-2020-11431

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to perform directory traversal attacks on i-net software products, enabling them to read arbitrary files and directories on the target server. It affects i-net Clear Reports, HelpDesk, and PDFC components. Any organization using these products with internet-facing instances is at risk.

💻 Affected Systems

Products:
  • i-net Clear Reports
  • i-net HelpDesk
  • i-net PDFC
Versions: Clear Reports 16.0 to 19.2, HelpDesk 8.0 to 8.3, PDFC 4.3 to 6.2
Operating Systems: All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: The documentation component in these products is vulnerable. All installations within the affected version ranges are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, credentials, and other critical data, potentially leading to full system compromise.

🟠

Likely Case

Attackers will read sensitive files containing configuration data, credentials, and other proprietary information that could be used for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the affected application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple HTTP requests. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Clear Reports 19.2, HelpDesk 8.3, PDFC 6.2

Vendor Advisory: https://www.inetsoftware.de/support/news/i-net-clear-reports-security-advisory-2020-apr-06

Restart Required: Yes

Instructions:

1. Download the latest version from i-net software website. 2. Backup current installation. 3. Install the patched version. 4. Restart the application service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the vulnerable components using firewall rules

Web Application Firewall

all

Deploy WAF with directory traversal protection rules

🧯 If You Can't Patch

  • Isolate the affected systems from internet access
  • Implement strict network segmentation and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if your i-net software version falls within the affected ranges. Attempt to access files outside the web root using directory traversal sequences.

Check Version:

Check the application's admin interface or configuration files for version information

Verify Fix Applied:

Verify the installed version is patched (Clear Reports >=19.2, HelpDesk >=8.3, PDFC >=6.2) and test that directory traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences
  • Unusual file access patterns from external IPs
  • Access to files outside normal web directories

Network Indicators:

  • HTTP requests with directory traversal payloads
  • Multiple failed attempts to access system files

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export