CVE-2021-36121

8.8 HIGH

📋 TL;DR

CVE-2021-36121 is an unrestricted file upload vulnerability in Echo ShareCare 8.15.5 that allows authenticated users to upload arbitrary files to arbitrary locations via directory traversal. This leads to remote code execution as the SYSTEM user on Windows systems. Organizations running vulnerable versions of Echo ShareCare are affected.

💻 Affected Systems

Products:
  • Echo ShareCare
Versions: 8.15.5 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable endpoint. The Z: drive mapping is hard-coded in the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, allowing complete control over the server, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to malware deployment, data exfiltration, and persistence establishment on affected systems.

🟢

If Mitigated

Limited impact with proper network segmentation and file upload restrictions, potentially only affecting the ShareCare application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Public proof-of-concept demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.15.6 or later

Vendor Advisory: https://www.echobh.com/security-advisory/

Restart Required: Yes

Instructions:

1. Contact Echo support for the latest patched version. 2. Backup configuration and data. 3. Install the updated version. 4. Restart the ShareCare service. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict File Upload Endpoint

windows

Block or restrict access to the vulnerable endpoint using web application firewall or network controls.

# Example IIS URL Rewrite rule to block Access/DownloadFeed_Mnt/FileUpload_Upd.cfm
<rule name="Block ShareCare File Upload" stopProcessing="true">
  <match url="Access/DownloadFeed_Mnt/FileUpload_Upd\.cfm" />
  <action type="CustomResponse" statusCode="403" statusReason="Forbidden" statusDescription="Access Denied" />
</rule>

Implement File Upload Validation

all

Add server-side validation to restrict file types and prevent directory traversal in file uploads.

# Implement in ColdFusion application code
<cfif NOT IsValid("regex", form.name1, "^[a-zA-Z0-9_\-\.]+\.(txt|pdf|docx)$")>
  <cfthrow message="Invalid filename" />
</cfif>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ShareCare servers from critical systems.
  • Enforce least privilege for ShareCare service accounts and monitor for suspicious file upload activities.

🔍 How to Verify

Check if Vulnerable:

Check if ShareCare version is 8.15.5 or earlier and if the file upload endpoint is accessible to authenticated users.

Check Version:

Check ShareCare administration interface or application configuration files for version information.

Verify Fix Applied:

Verify ShareCare version is 8.15.6 or later and test that file upload with directory traversal payloads is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload requests to Access/DownloadFeed_Mnt/FileUpload_Upd.cfm
  • Files with suspicious names or paths containing ../ sequences
  • Execution of unexpected files from ShareCare directories

Network Indicators:

  • HTTP POST requests to the vulnerable endpoint with filename parameters containing path traversal sequences

SIEM Query:

source="sharecare_logs" AND (uri="*FileUpload_Upd.cfm*" AND (filename="*../*" OR filename="*..\\*"))

🔗 References

📤 Share & Export