CVE-2023-31294

7.5 HIGH

📋 TL;DR

A CSV injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 allows remote attackers to extract sensitive information by manipulating the Delivery Name field. This affects organizations using the vulnerable CPTO software for logistics and cash management operations. Attackers can potentially access confidential data through crafted CSV exports.

💻 Affected Systems

Products:
  • Sesami Cash Point & Transport Optimizer (CPTO)
Versions: Version 6.3.8.6 (#718)
Operating Systems: Windows-based systems running CPTO
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Delivery Name field functionality within the CPTO application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive operational data including delivery details, financial information, and customer records through CSV file manipulation.

🟠

Likely Case

Extraction of delivery-related sensitive information and potential data leakage of operational logistics data.

🟢

If Mitigated

Limited or no data exposure with proper input validation and output encoding controls in place.

🌐 Internet-Facing: MEDIUM - Requires user interaction with CSV exports but could be exploited through phishing or social engineering.
🏢 Internal Only: MEDIUM - Internal users with access to the system could exploit this to extract sensitive data they shouldn't have access to.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction with CSV exports and knowledge of CSV injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.3.8.7 or later

Vendor Advisory: https://herolab.usd.de/en/security-advisories/usd-2022-0052/

Restart Required: Yes

Instructions:

1. Contact Sesami support for the latest patched version. 2. Backup current configuration and data. 3. Install the updated CPTO version. 4. Restart the CPTO service and verify functionality.

🔧 Temporary Workarounds

Input Validation for Delivery Name Field

all

Implement strict input validation to prevent CSV injection payloads in the Delivery Name field

Not applicable - requires application-level code changes

CSV Output Sanitization

all

Sanitize CSV exports by encoding special characters and validating data before export

Not applicable - requires application-level code changes

🧯 If You Can't Patch

  • Restrict user permissions to only necessary functions and implement least privilege access
  • Monitor CSV export activities and implement DLP solutions to detect sensitive data exfiltration

🔍 How to Verify

Check if Vulnerable:

Check CPTO version in application settings or about dialog - if version is 6.3.8.6 (#718), system is vulnerable

Check Version:

Check CPTO application menu → Help → About or view application properties

Verify Fix Applied:

Verify CPTO version is 6.3.8.7 or later and test CSV export functionality with special characters in Delivery Name field

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export activities
  • Multiple failed CSV export attempts
  • Export logs showing special characters in Delivery Name field

Network Indicators:

  • Unexpected CSV file downloads from CPTO server
  • Large CSV file transfers to unusual destinations

SIEM Query:

source="cpto_logs" AND (event="csv_export" AND (data CONTAINS "=\"" OR data CONTAINS "+cmd|"))

🔗 References

📤 Share & Export