CVE-2023-0744

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access controls in Answerdev Answer software versions prior to 1.0.4, potentially leading to account takeover. It affects all Answer installations running vulnerable versions, particularly those exposed to untrusted users.

💻 Affected Systems

Products:
  • Answerdev Answer
Versions: All versions prior to 1.0.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Answer installations regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user accounts, including administrative accounts, leading to data theft, privilege escalation, and full system control.

🟠

Likely Case

Unauthorized access to user accounts, allowing attackers to view sensitive data, modify content, or perform actions as legitimate users.

🟢

If Mitigated

No impact if proper access controls are enforced and the vulnerability is patched.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on Packet Storm Security and require some authentication interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4

Vendor Advisory: https://github.com/answerdev/answer/commit/c1fa2b13f6b547b96da60b23350bbe2b29de542d

Restart Required: Yes

Instructions:

1. Backup your Answer installation and database. 2. Update to Answer version 1.0.4 or later via your package manager or by downloading from GitHub. 3. Restart the Answer service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Answer instances to trusted IP addresses only.

Use firewall rules to limit access (e.g., iptables -A INPUT -p tcp --dport [Answer_port] -s [trusted_IP] -j ACCEPT)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Answer instances from untrusted networks.
  • Enable detailed logging and monitoring for suspicious authentication or access control events.

🔍 How to Verify

Check if Vulnerable:

Check the Answer version in your installation. If it's below 1.0.4, you are vulnerable.

Check Version:

Check the Answer admin panel or configuration files for version information.

Verify Fix Applied:

After updating, confirm the version is 1.0.4 or higher and test access control functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts, access control failures, or unexpected user privilege changes.

Network Indicators:

  • Suspicious HTTP requests to authentication or user management endpoints.

SIEM Query:

source="answer_logs" AND (event="authentication_failure" OR event="privilege_escalation")

🔗 References

📤 Share & Export