CVE-2020-9398

9.8 CRITICAL

📋 TL;DR

This vulnerability allows SQL injection attacks in ISPConfig control panels where the undocumented 'reverse_proxy_panel_allowed=sites' option has been manually enabled. Attackers can execute arbitrary SQL commands against the database. Only ISPConfig installations with this specific configuration are affected.

💻 Affected Systems

Products:
  • ISPConfig
Versions: All versions before 3.1.15p3
Operating Systems: Linux
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when the undocumented 'reverse_proxy_panel_allowed=sites' option is manually enabled in configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion, potentially leading to full system takeover if database privileges permit.

🟠

Likely Case

Database information disclosure, authentication bypass, or privilege escalation within ISPConfig.

🟢

If Mitigated

No impact if the vulnerable configuration is not enabled or the system is patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to ISPConfig interface and the specific configuration to be enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.15p3

Vendor Advisory: https://www.ispconfig.org/blog/ispconfig-3-1-15p3-released-security-bugfix-release/

Restart Required: No

Instructions:

1. Backup your ISPConfig installation and database. 2. Update to ISPConfig 3.1.15p3 or later. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable configuration

linux

Remove or disable the 'reverse_proxy_panel_allowed=sites' option from ISPConfig configuration.

Edit ISPConfig configuration files to remove 'reverse_proxy_panel_allowed=sites' setting

🧯 If You Can't Patch

  • Disable the 'reverse_proxy_panel_allowed=sites' configuration option immediately.
  • Implement network segmentation to restrict access to ISPConfig interface.

🔍 How to Verify

Check if Vulnerable:

Check ISPConfig version and verify if 'reverse_proxy_panel_allowed=sites' is enabled in configuration.

Check Version:

Check ISPConfig version in web interface or configuration files.

Verify Fix Applied:

Confirm ISPConfig version is 3.1.15p3 or later and check configuration files for vulnerable setting.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from ISPConfig application
  • SQL error messages in application logs

Network Indicators:

  • Suspicious HTTP requests to ISPConfig reverse proxy endpoints

SIEM Query:

Search for SQL error patterns or unusual database access from ISPConfig application.

🔗 References

📤 Share & Export