CVE-2021-43970

8.8 HIGH

📋 TL;DR

An authenticated attacker with low privileges can upload malicious files disguised as MP3s to execute arbitrary code on Quicklert for Digium servers. This vulnerability affects Quicklert for Digium version 10.0.0 (1043) and allows remote code execution with SYSTEM-level permissions.

💻 Affected Systems

Products:
  • Quicklert for Digium
Versions: 10.0.0 (1043)
Operating Systems: Windows (implied by SYSTEM context)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but low privileges sufficient. File upload functionality in albumimages.jsp vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, allowing installation of persistent backdoors, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Attacker uploads web shell to gain persistent access, executes commands to steal sensitive data, or uses server as pivot point for further attacks.

🟢

If Mitigated

With proper file upload validation and least privilege controls, impact limited to file upload denial or isolated application compromise.

🌐 Internet-Facing: HIGH - Web interface accessible from internet allows authenticated attackers to exploit remotely.
🏢 Internal Only: HIGH - Even internal attackers with low privileges can exploit to gain SYSTEM access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but uses simple file upload bypass technique. Weaponization likely due to RCE potential and SYSTEM privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updated version

Vendor Advisory: https://quicklert.com

Restart Required: Yes

Instructions:

1. Contact Quicklert/Digium for patch information. 2. Apply vendor-provided update. 3. Restart Quicklert service. 4. Verify fix by testing file upload functionality.

🔧 Temporary Workarounds

Disable albumimages.jsp file upload

all

Remove or restrict access to vulnerable JSP file upload endpoint

# Rename or move albumimages.jsp to disable
mv /path/to/albumimages.jsp /path/to/albumimages.jsp.disabled

Implement file upload validation

all

Add server-side validation to reject files with double extensions or JSP content

# Example: Add validation in web.xml or application config
# Reject files containing ';' in filename or .jsp extension

🧯 If You Can't Patch

  • Restrict network access to Quicklert interface to trusted IPs only
  • Implement WAF rules to block file uploads with double extensions or JSP content

🔍 How to Verify

Check if Vulnerable:

Check if Quicklert version is 10.0.0 (1043) and albumimages.jsp accepts files with .mp3;.jsp extension containing audio header.

Check Version:

Check Quicklert web interface or configuration files for version information

Verify Fix Applied:

Test file upload with malicious .mp3;.jsp file - should be rejected. Verify version is updated.

📡 Detection & Monitoring

Log Indicators:

  • File upload requests to albumimages.jsp with double extensions
  • JSP file execution in unexpected directories
  • SYSTEM privilege processes spawned from web user context

Network Indicators:

  • HTTP POST requests to albumimages.jsp with file uploads
  • Outbound connections from Quicklert server to suspicious IPs

SIEM Query:

source="quicklert.log" AND (uri="*albumimages.jsp*" AND method="POST") OR (process_name="cmd.exe" AND parent_process="java.exe")

🔗 References

📤 Share & Export