CVE-2023-0994

7.5 HIGH

📋 TL;DR

This CVE describes an information exposure vulnerability in RosarioSIS, an open-source student information system. The vulnerability allows unauthorized actors to access sensitive information through improper access controls. All users running RosarioSIS versions prior to 10.8.2 are affected.

💻 Affected Systems

Products:
  • RosarioSIS
Versions: All versions prior to 10.8.2
Operating Systems: Any OS running RosarioSIS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all RosarioSIS installations regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive student data, personal information, grades, attendance records, and potentially administrative credentials, leading to data breaches and privacy violations.

🟠

Likely Case

Unauthorized users accessing student records, grades, or personal information they shouldn't have access to, potentially violating privacy regulations like FERPA.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to authorized users within the same network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

The vulnerability appears to be an access control issue that could be exploited by authenticated users to access unauthorized data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.8.2

Vendor Advisory: https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76

Restart Required: No

Instructions:

1. Backup your RosarioSIS installation and database. 2. Download RosarioSIS 10.8.2 or later from the official repository. 3. Replace the existing installation with the new version. 4. Verify the fix by checking that the vulnerable code has been patched.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to RosarioSIS to authorized networks only using firewall rules.

Enhanced Authentication

all

Implement additional authentication layers or require VPN access for RosarioSIS.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RosarioSIS from untrusted networks
  • Enable detailed logging and monitoring for unauthorized access attempts to sensitive data

🔍 How to Verify

Check if Vulnerable:

Check your RosarioSIS version. If it's below 10.8.2, you are vulnerable.

Check Version:

Check the version.php file in your RosarioSIS installation directory or look for version information in the web interface footer.

Verify Fix Applied:

After upgrading to 10.8.2 or later, verify that the specific commit 630d3e3d78270db8dbcbfe87db265bc3e70c5a76 is present in your installation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to student data or administrative functions
  • Multiple failed access attempts followed by successful access to sensitive data

Network Indicators:

  • Unusual data transfers from RosarioSIS to external IPs
  • Access from unauthorized IP addresses

SIEM Query:

source="rosariosis" AND (event="data_access" OR event="unauthorized_access") AND status="success" AND user_role!="admin"

🔗 References

📤 Share & Export