CVE-2020-11560
📋 TL;DR
CVE-2020-11560 is a vulnerability in NCH Express Invoice 7.25 that allows local users to read cleartext passwords from the application's configuration file. This affects users of NCH Express Invoice 7.25 on Windows systems where local access to the configuration file is possible.
💻 Affected Systems
- NCH Express Invoice
📦 What is this software?
Express Invoice by Nchsoftware
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access can steal administrative credentials, potentially leading to full system compromise, data theft, or privilege escalation.
Likely Case
Local users or malware can extract passwords, potentially compromising the application and any systems using the same credentials.
If Mitigated
With proper access controls and file permissions, the risk is limited to authorized local users only.
🎯 Exploit Status
Exploitation requires local file read access. Public proof-of-concept demonstrates reading the configuration file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 7.25
Vendor Advisory: https://www.nchsoftware.com/invoice/versions.html
Restart Required: Yes
Instructions:
1. Download and install the latest version of NCH Express Invoice from the official website. 2. Restart the application. 3. Change all passwords that were stored in the vulnerable version.
🔧 Temporary Workarounds
Restrict File Permissions
windowsSet strict file permissions on the configuration file to prevent unauthorized local users from reading it.
icacls "C:\Program Files (x86)\NCH Software\ExpressInvoice\config.ini" /deny Users:R
icacls "C:\ProgramData\NCH Software\ExpressInvoice\config.ini" /deny Users:R
🧯 If You Can't Patch
- Implement strict access controls to limit local user access to the system.
- Monitor for unauthorized access to the configuration file using file integrity monitoring.
🔍 How to Verify
Check if Vulnerable:
Check if NCH Express Invoice version 7.25 is installed and if the configuration file contains cleartext passwords.
Check Version:
Check Help > About in the application or examine the installation directory for version information.
Verify Fix Applied:
Verify the application version is updated beyond 7.25 and that passwords are no longer stored in cleartext in configuration files.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access events to the configuration file from non-administrative users.
Network Indicators:
- No network indicators as this is a local vulnerability.
SIEM Query:
EventID=4663 AND ObjectName LIKE '%ExpressInvoice%config.ini%' AND Accesses='ReadData'
🔗 References
- http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html
- https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html
- https://www.youtube.com/watch?v=V0BWq33qVCs&feature=youtu.be
- http://packetstormsecurity.com/files/173117/NCH-Express-Invoice-7.25-Cleartext-Password.html
- https://tejaspingulkar.blogspot.com/2020/03/cve-cve-2020-11560-title-clear-text.html
- https://www.youtube.com/watch?v=V0BWq33qVCs&feature=youtu.be