CVE-2023-1287

9.0 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on ENOVIA Live Collaboration servers by exploiting an XSL template injection flaw. It affects organizations using ENOVIA Live Collaboration V6R2013xE. Attackers can potentially take full control of affected systems.

💻 Affected Systems

Products:
  • ENOVIA Live Collaboration
Versions: V6R2013xE
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Specific configuration details not provided in CVE description.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, lateral movement within the network, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to steal sensitive data, disrupt operations, or use the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, strict access controls, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

XSL template injection vulnerabilities typically require understanding of the application's XSL processing but can be exploited remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in CVE

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Check the Dassault Systèmes advisory for specific patch details. 2. Apply the official patch from Dassault Systèmes. 3. Restart the ENOVIA Live Collaboration service. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to ENOVIA Live Collaboration to only trusted IP addresses.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [ENOVIA_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ENOVIA_PORT] -j DROP

Application Layer Filtering

all

Implement WAF rules to block malicious XSL template injection attempts.

Configure WAF to block requests containing suspicious XSL patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ENOVIA servers from critical systems.
  • Deploy intrusion detection systems and monitor for unusual XSL processing activity.

🔍 How to Verify

Check if Vulnerable:

Check ENOVIA Live Collaboration version against V6R2013xE. If running this version, assume vulnerable.

Check Version:

Check ENOVIA administration console or configuration files for version information.

Verify Fix Applied:

Verify the installed version is updated beyond V6R2013xE as per Dassault Systèmes advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XSL template processing errors
  • Unexpected system command execution in logs
  • Abnormal process creation from ENOVIA service

Network Indicators:

  • Suspicious HTTP requests containing XSL payloads to ENOVIA endpoints
  • Outbound connections from ENOVIA server to unknown external IPs

SIEM Query:

source="ENOVIA" AND (event="XSL processing error" OR process="cmd.exe" OR process="bash")

🔗 References

📤 Share & Export