CVE-2021-43397
📋 TL;DR
CVE-2021-43397 is a privilege escalation vulnerability in LiquidFiles that allows authenticated users with Admin or User Admin privileges to elevate their permissions to Sysadmin level. This affects LiquidFiles installations before version 3.6.3. Attackers with existing administrative access can gain full system control.
💻 Affected Systems
- LiquidFiles
📦 What is this software?
Liquidfiles by Liquidfiles
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where an attacker gains Sysadmin privileges, allowing them to access all data, modify system configurations, create new admin accounts, and potentially execute arbitrary code.
Likely Case
Unauthorized privilege escalation from lower administrative roles to full Sysadmin access, enabling data exfiltration, system configuration changes, and persistence mechanisms.
If Mitigated
Limited impact if proper access controls, network segmentation, and monitoring are in place to detect privilege escalation attempts.
🎯 Exploit Status
Exploit details and proof-of-concept code are publicly available. Requires existing administrative credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.3
Vendor Advisory: https://man.liquidfiles.com/release_notes/version_3-6-x.html
Restart Required: Yes
Instructions:
1. Backup your LiquidFiles configuration and data. 2. Download LiquidFiles version 3.6.3 or later from the official vendor site. 3. Follow the upgrade instructions specific to your deployment method (appliance, virtual machine, or manual installation). 4. Restart the LiquidFiles service after upgrade completion.
🔧 Temporary Workarounds
Restrict Administrative Access
allLimit the number of users with Admin or User Admin privileges to only those who absolutely need them.
Network Segmentation
allPlace LiquidFiles instances behind firewalls and restrict access to administrative interfaces to trusted IP addresses only.
🧯 If You Can't Patch
- Implement strict access controls and monitor all administrative account activity for suspicious behavior.
- Deploy network-based intrusion detection systems to monitor for privilege escalation attempts and anomalous administrative actions.
🔍 How to Verify
Check if Vulnerable:
Check the LiquidFiles web interface admin panel for the current version. If version is below 3.6.3, the system is vulnerable.
Check Version:
curl -k https://<liquidfiles-server>/api/v4/system/version
Verify Fix Applied:
After upgrading, verify the version shows 3.6.3 or higher in the admin panel. Test that Admin users cannot escalate to Sysadmin privileges.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation attempts in application logs
- Multiple failed then successful authentication attempts for admin accounts
- Unexpected changes to user roles or permissions
Network Indicators:
- Unusual API calls to privilege-related endpoints from non-standard IP addresses
- Increased traffic to administrative interfaces
SIEM Query:
source="liquidfiles.log" AND ("privilege" OR "escalation" OR "sysadmin")
🔗 References
- http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2021/Nov/40
- http://seclists.org/fulldisclosure/2021/Nov/52
- https://forum.liquidfiles.com/forums/news.6/
- https://man.liquidfiles.com/release_notes/version_3-6-x.html
- http://packetstormsecurity.com/files/164997/LiquidFiles-3.5.13-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2021/Nov/40
- http://seclists.org/fulldisclosure/2021/Nov/52
- https://forum.liquidfiles.com/forums/news.6/
- https://man.liquidfiles.com/release_notes/version_3-6-x.html