CVE-2023-28614

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on Freewill iFIS (SMART Trade) servers by injecting shell metacharacters into report page parameters. It affects organizations using Freewill iFIS version 20.01.01.04 for financial trading operations.

💻 Affected Systems

Products:
  • Freewill iFIS
  • SMART Trade
Versions: 20.01.01.04
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the report page functionality and is exploitable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands with application privileges, potentially leading to data theft, ransomware deployment, or complete server takeover.

🟠

Likely Case

Unauthenticated remote code execution leading to data exfiltration, installation of backdoors, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, application firewalls, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated command execution, posing significant risk to internal networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with publicly available technical details. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Freewill Solutions for patched version

Vendor Advisory: https://www.freewillsolutions.com/smart-trade-ifis

Restart Required: Yes

Instructions:

1. Contact Freewill Solutions support for patched version
2. Backup current configuration and data
3. Apply the patch provided by vendor
4. Restart the iFIS service
5. Verify functionality

🔧 Temporary Workarounds

Network Segmentation

all

Isolate iFIS servers from internet and restrict internal access to authorized users only

Web Application Firewall

all

Deploy WAF with rules to block shell metacharacters in report page parameters

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and restrict internal network access
  • Implement strict input validation and sanitization at network perimeter

🔍 How to Verify

Check if Vulnerable:

Check if running Freewill iFIS version 20.01.01.04. Review application logs for suspicious report page requests containing shell metacharacters.

Check Version:

Check application interface or configuration files for version information (specific command depends on installation)

Verify Fix Applied:

Verify with vendor that patched version is installed. Test report functionality with safe inputs to ensure no command execution occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report page requests containing characters like ;, |, &, $, (, ), {, }
  • Unexpected command execution in system logs from iFIS process

Network Indicators:

  • HTTP requests to report endpoints with shell metacharacters in parameters
  • Outbound connections from iFIS server to unexpected destinations

SIEM Query:

source="iFIS_logs" AND (uri="*report*" AND (param="*;*" OR param="*|*" OR param="*&*" OR param="*$(*"))

🔗 References

📤 Share & Export