CVE-2022-27192
📋 TL;DR
CVE-2022-27192 is an information disclosure vulnerability in the Reporting module of Aseco Lietuva's DVS Avilys document management system. It allows unauthenticated attackers to download administrative files by impersonating administrators. Organizations using DVS Avilys versions before 3.5.58 are affected.
💻 Affected Systems
- Aseco Lietuva DVS Avilys
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive administrative files, credentials, and system configuration data leading to full system takeover or data breach.
Likely Case
Unauthorized access to sensitive documents, configuration files, and potentially credentials stored in administrative directories.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external exploitation.
🎯 Exploit Status
Simple HTTP requests can trigger the vulnerability. Public proof-of-concept demonstrates file download capability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.5.58 and later
Vendor Advisory: https://lt.asseco.com/sprendimai/dokumentu-valdymas/dvs-avilys/
Restart Required: Yes
Instructions:
1. Download DVS Avilys version 3.5.58 or later from official vendor site. 2. Backup current installation and data. 3. Install the updated version following vendor documentation. 4. Restart the DVS Avilys service. 5. Verify functionality post-update.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to DVS Avilys to trusted IP addresses only
iptables -A INPUT -p tcp --dport [DVS_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [DVS_PORT] -j DROP
Web Server Configuration
allAdd authentication requirements to Reporting module endpoints
# Configure web server (Apache/Nginx) to require authentication for /reporting/* paths
🧯 If You Can't Patch
- Implement strict network segmentation to isolate DVS Avilys from untrusted networks
- Deploy web application firewall (WAF) rules to block unauthorized file download patterns
🔍 How to Verify
Check if Vulnerable:
Attempt to access administrative files via Reporting module endpoints without authentication. Check if version is below 3.5.58.
Check Version:
Check DVS Avilys admin interface or configuration files for version information
Verify Fix Applied:
After patching, attempt the same unauthorized file access attempts - they should fail with proper authentication requirements.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /reporting/* endpoints
- File download patterns from unauthenticated sources
- Access to administrative file paths
Network Indicators:
- HTTP GET requests to reporting endpoints without authentication headers
- Unusual file download patterns from DVS Avilys server
SIEM Query:
source="dvs_avilys_logs" AND (uri_path="/reporting/*" AND NOT auth_success="true")