CVE-2023-25289

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to perform directory traversal attacks on the Digital Receptie virtual reception software's embedded web server. By sending specially crafted GET requests, attackers can access sensitive files outside the intended directory. Organizations using Digital Receptie version win7sp1_rtm.101119-1850 6.1.7601.1.0.65792 are affected.

💻 Affected Systems

Products:
  • virtualreception Digital Receptie
Versions: win7sp1_rtm.101119-1850 6.1.7601.1.0.65792
Operating Systems: Windows 7 SP1
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the embedded web server component. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through retrieval of sensitive configuration files, credentials, or system files leading to further attacks.

🟠

Likely Case

Exfiltration of sensitive information including configuration files, logs, and potentially credentials stored in accessible directories.

🟢

If Mitigated

Limited information disclosure restricted to non-sensitive files if proper access controls and directory restrictions are implemented.

🌐 Internet-Facing: HIGH - The embedded web server is typically internet-facing for virtual reception functionality, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - If deployed internally only, risk is reduced but still significant if attackers gain internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID: 51142). The attack requires no authentication and uses simple directory traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Web Server Access Restriction

windows

Restrict access to the embedded web server using firewall rules or network segmentation.

netsh advfirewall firewall add rule name="Block Digital Receptie" dir=in action=block program="C:\Path\To\DigitalReceptie.exe" enable=yes

Application Whitelisting

windows

Implement application control to prevent unauthorized modifications to the Digital Receptie software.

🧯 If You Can't Patch

  • Isolate the system on a segmented network with strict firewall rules limiting inbound connections.
  • Implement web application firewall (WAF) rules to block directory traversal patterns in HTTP requests.

🔍 How to Verify

Check if Vulnerable:

Test by sending a crafted GET request with directory traversal sequences (e.g., GET /../../windows/system32/drivers/etc/hosts) to the embedded web server.

Check Version:

Check the software version in the application interface or installation directory properties.

Verify Fix Applied:

Retest with the same directory traversal attempts; successful requests should return 403/404 errors instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests containing '../' sequences
  • Unusual file access patterns from web server logs
  • Access to system files from web server process

Network Indicators:

  • HTTP requests with multiple directory traversal sequences (e.g., ../../)
  • Unusual file extensions being requested via HTTP

SIEM Query:

source="web_server_logs" AND (http_method="GET" AND url="*../*")

🔗 References

📤 Share & Export