CVE-2023-31181

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in WJJ Software's InnoKB Server and InnoKB/Console allows attackers to access files outside the intended directory by manipulating file paths. It affects version 2.2.1 of these products, potentially exposing sensitive system files to unauthorized users.

💻 Affected Systems

Products:
  • WJJ Software InnoKB Server
  • WJJ Software InnoKB/Console
Versions: 2.2.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 2.2.1 are vulnerable by default. The vulnerability exists in the file handling mechanisms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive files like /etc/passwd, /etc/shadow, or Windows SAM files, potentially leading to credential theft and lateral movement.

🟠

Likely Case

Unauthorized access to configuration files, logs, or application data stored on the server, potentially exposing sensitive information.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, restricting access to critical system files.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this for lateral movement or data exfiltration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically require minimal technical skill to exploit using tools like curl or web browsers with crafted URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.2 or later

Vendor Advisory: https://www.gov.il/en/Departments/faq/cve_advisories

Restart Required: Yes

Instructions:

1. Download latest version from vendor. 2. Backup configuration and data. 3. Stop InnoKB services. 4. Install updated version. 5. Restart services. 6. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block path traversal sequences

# Example mod_security rule for Apache:
SecRule ARGS "\.\./" "id:1001,phase:2,deny,status:403,msg:'Path Traversal Attempt'

File Permission Restriction

all

Run InnoKB with minimal file system permissions

# Linux: chown -R innokb:innokb /var/lib/innokb
# Windows: Configure service account with limited privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate InnoKB servers from sensitive systems
  • Deploy web application firewall with path traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Test with crafted URL like http://server:port/../../etc/passwd or similar path traversal attempts

Check Version:

# Windows: Check program files directory or registry
# Linux: dpkg -l | grep innokb or rpm -qa | grep innokb

Verify Fix Applied:

Attempt same path traversal tests after patch - should return 403/404 errors instead of file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ or ..\ sequences
  • Access to unexpected file paths in application logs
  • 403/404 errors followed by successful file access

Network Indicators:

  • HTTP requests with encoded path traversal sequences (%2e%2e%2f)
  • Unusual file access patterns from single IP

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export