CVE-2023-33365

7.5 HIGH

📋 TL;DR

An unauthenticated path traversal vulnerability in Suprema BioStar 2 allows attackers to read arbitrary files from the web server. This affects BioStar 2 installations before version 2.9.1. Attackers can exploit this without credentials to access sensitive system files.

💻 Affected Systems

Products:
  • Suprema BioStar 2
Versions: All versions before 2.9.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of BioStar 2 before the patched version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files like configuration files, password hashes, or database credentials, potentially leading to full system compromise.

🟠

Likely Case

Attackers will read configuration files and sensitive data, enabling further attacks like credential theft or lateral movement.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to file disclosure without escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests with directory traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.1

Vendor Advisory: https://kb.supremainc.com/knowledge/doku.php?id=en:release_note_291

Restart Required: Yes

Instructions:

1. Download BioStar 2 version 2.9.1 from Suprema's official site. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the BioStar 2 service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to BioStar 2 web interface to trusted IPs only.

Web Server Configuration

all

Configure web server to block directory traversal sequences in URLs.

🧯 If You Can't Patch

  • Isolate BioStar 2 server from internet and restrict internal network access.
  • Implement WAF rules to block path traversal patterns in HTTP requests.

🔍 How to Verify

Check if Vulnerable:

Check BioStar 2 version in web interface or installation directory. If version is below 2.9.1, it's vulnerable.

Check Version:

Check web interface login page or installation directory for version file.

Verify Fix Applied:

Confirm version is 2.9.1 or higher in web interface or via version check command.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences or attempts to access unusual file paths

Network Indicators:

  • Unusual file read patterns from unauthenticated sources

SIEM Query:

source="webserver" AND (url="*../*" OR url="*..\\*" OR status=200 AND file_extension IN ('.conf', '.ini', '.txt', '.xml'))

🔗 References

📤 Share & Export