CVE-2023-3374

9.8 CRITICAL

📋 TL;DR

CVE-2023-3374 is an incomplete input validation vulnerability in Unisign Bookreen that allows attackers to bypass security restrictions and escalate privileges. This affects all Bookreen installations before version 3.0.0, potentially enabling unauthorized administrative access.

💻 Affected Systems

Products:
  • Unisign Bookreen
Versions: All versions before 3.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with Bookreen before 3.0.0 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative control, data theft, and ability to deploy ransomware or other malware across the network.

🟠

Likely Case

Unauthorized privilege escalation leading to data access, configuration changes, and potential lateral movement within the environment.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though privilege escalation would still be possible within the application context.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of access to the application, but exploitation is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.0 or later

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0489

Restart Required: Yes

Instructions:

1. Download Bookreen 3.0.0 or later from official vendor sources. 2. Backup current configuration and data. 3. Stop Bookreen service. 4. Install the updated version. 5. Restart Bookreen service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Bookreen to only trusted sources

Enhanced Monitoring

all

Implement strict monitoring for privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict access controls and limit user permissions to minimum required
  • Deploy application-level firewall rules to monitor and block suspicious input patterns

🔍 How to Verify

Check if Vulnerable:

Check Bookreen version via admin interface or configuration files

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Confirm version is 3.0.0 or higher and test privilege escalation attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Multiple failed authentication followed by successful admin access
  • Configuration changes from non-admin users

Network Indicators:

  • Unusual authentication patterns to Bookreen
  • Multiple privilege change requests

SIEM Query:

source="bookreen" AND (event_type="privilege_change" OR user_role_change="true")

🔗 References

📤 Share & Export