CVE-2022-45088

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to include local PHP files on the server through improper input validation in Group Arge Energy and Control Systems Smartpower Web. It affects all versions before 23.01.01, potentially leading to information disclosure, code execution, or system compromise.

💻 Affected Systems

Products:
  • Group Arge Energy and Control Systems Smartpower Web
Versions: All versions before 23.01.01
Operating Systems: Any OS running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of Smartpower Web systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through remote code execution, allowing attackers to steal sensitive data, install malware, or pivot to other systems.

🟠

Likely Case

Information disclosure of sensitive files (configuration files, credentials, system files) and potential limited code execution.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and file permission restrictions.

🌐 Internet-Facing: HIGH - Web applications exposed to the internet are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

PHP Local File Inclusion vulnerabilities typically have low exploitation complexity and can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.01.01

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0066

Restart Required: Yes

Instructions:

1. Download version 23.01.01 from the vendor. 2. Backup current installation. 3. Apply the update following vendor instructions. 4. Restart the Smartpower Web service.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block PHP file inclusion patterns and path traversal attempts.

File Permission Restrictions

linux

Restrict web server permissions to prevent reading sensitive system files.

chmod 600 /etc/passwd
chmod 600 /etc/shadow
chmod 600 configuration_files

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict inbound/outbound rules.
  • Implement network segmentation to limit lateral movement potential.

🔍 How to Verify

Check if Vulnerable:

Check the software version in the web interface or configuration files. If version is below 23.01.01, the system is vulnerable.

Check Version:

Check the web interface admin panel or configuration files for version information.

Verify Fix Applied:

Verify the version has been updated to 23.01.01 or later in the web interface or configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Requests containing '../' or similar path traversal sequences
  • Access to PHP files not part of normal application flow

Network Indicators:

  • HTTP requests with path traversal payloads targeting PHP files
  • Unusual outbound connections from the web server

SIEM Query:

web_access_logs WHERE url CONTAINS '../' OR url CONTAINS 'php://' OR url CONTAINS 'file://'

🔗 References

📤 Share & Export