CVE-2021-38758

7.5 HIGH

📋 TL;DR

CVE-2021-38758 is a directory traversal vulnerability in Online Catering Reservation System 1.0 that allows attackers to read arbitrary files on the server by manipulating file paths in index.php. This affects all installations of version 1.0 of this specific catering reservation software.

💻 Affected Systems

Products:
  • Online Catering Reservation System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of version 1.0. No specific OS requirements.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files like configuration files, database credentials, or system files, potentially leading to full system compromise if credentials are exposed.

🟠

Likely Case

Unauthorized file disclosure including configuration files, source code, and potentially sensitive customer data stored in accessible files.

🟢

If Mitigated

Limited impact with proper file permissions and web server configuration restricting access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal via index.php parameter manipulation. Public exploit code available in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a different catering reservation system or implementing custom fixes.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to index.php to filter directory traversal sequences

Modify index.php to validate and sanitize file path parameters before processing

Web Server Restrictions

all

Configure web server to restrict access to sensitive directories

For Apache: Add 'AllowOverride None' and 'Deny from all' to sensitive directories in .htaccess
For Nginx: Use 'location' blocks to restrict directory access

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory traversal patterns
  • Restrict file system permissions to minimum required for web server operation

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access sensitive files via index.php with traversal sequences like '../../etc/passwd'

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify that traversal attempts return error messages or are blocked, and cannot access files outside web root

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed attempts to access files with '..' sequences in URL parameters
  • Access to sensitive system files from web server process

Network Indicators:

  • HTTP requests containing '../' or similar traversal patterns in URL parameters

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..%2f*")

🔗 References

📤 Share & Export