CVE-2023-27107

8.8 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to generate internal reports in MyQ Solution Print Server and Central Server by accessing a direct URL, bypassing proper access controls. It affects organizations using MyQ Solution Print Server before version 8.2 Patch 32 and Central Server before version 8.2 Patch 22. Attackers can exploit this to access sensitive information they shouldn't have permission to view.

💻 Affected Systems

Products:
  • MyQ Solution Print Server
  • MyQ Solution Central Server
Versions: Print Server: versions before 8.2 Patch 32; Central Server: versions before 8.2 Patch 22
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of vulnerable versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users access sensitive internal reports containing confidential business data, user information, or system details that could facilitate further attacks.

🟠

Likely Case

Internal users with limited privileges access reports beyond their authorization level, potentially exposing sensitive operational data.

🟢

If Mitigated

Proper access controls prevent unauthorized report generation, limiting users to only reports they're authorized to access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the server but doesn't require authentication to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Print Server: 8.2 Patch 32 or later; Central Server: 8.2 Patch 22 or later

Vendor Advisory: https://www.myq-solution.com/en/support/security-advisories

Restart Required: Yes

Instructions:

1. Download the latest patch from MyQ Solution support portal. 2. Backup current configuration. 3. Apply the patch following vendor instructions. 4. Restart the service. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to MyQ servers to only authorized users and systems

Web Application Firewall Rules

all

Implement WAF rules to block unauthorized access to report generation URLs

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MyQ servers from untrusted networks
  • Monitor and alert on unauthorized access attempts to report generation endpoints

🔍 How to Verify

Check if Vulnerable:

Check MyQ Solution version in administration interface or via version check command

Check Version:

Check version in MyQ Solution web interface under Administration > About or System Information

Verify Fix Applied:

Verify version is at least Print Server 8.2 Patch 32 or Central Server 8.2 Patch 22, then test that unauthorized users cannot access report generation

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /runReport or similar report generation endpoints
  • Failed authentication events followed by successful report generation

Network Indicators:

  • HTTP requests to report generation URLs from unauthorized IP addresses or users

SIEM Query:

source="myq_server" AND (url="*runReport*" OR url="*report*generation*") AND user="*" AND NOT user IN authorized_users_list

🔗 References

📤 Share & Export