CVE-2023-33756

7.5 HIGH

📋 TL;DR

This directory traversal vulnerability in Foswiki's SpreadSheetPlugin allows attackers to access files outside the intended directory structure. It affects Foswiki versions 2.1.7 and below, potentially exposing sensitive system files to unauthorized users.

💻 Affected Systems

Products:
  • Foswiki
Versions: 2.1.7 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with SpreadSheetPlugin enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files like /etc/passwd, configuration files, or source code, potentially leading to credential theft, privilege escalation, or further system compromise.

🟠

Likely Case

Unauthorized access to application files, configuration data, or user-uploaded content stored within the Foswiki directory structure.

🟢

If Mitigated

Limited impact with proper file permissions, web server restrictions, and network segmentation preventing access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are commonly exploited and require minimal technical skill

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foswiki 2.1.8 or SpreadSheetPlugin 2.12

Vendor Advisory: https://foswiki.org/Support/SecurityAlert-CVE-2023-33756

Restart Required: No

Instructions:

1. Upgrade to Foswiki 2.1.8 or later. 2. Alternatively, update SpreadSheetPlugin to version 2.12 or later via the Extension Installer. 3. Clear browser cache after update.

🔧 Temporary Workarounds

Disable SpreadSheetPlugin

linux

Temporarily disable the vulnerable plugin until patching is possible

cd /path/to/foswiki
mv lib/Foswiki/Plugins/SpreadSheetPlugin.pm lib/Foswiki/Plugins/SpreadSheetPlugin.pm.disabled

Web Server Restrictions

all

Configure web server to block directory traversal patterns

# For Apache: Add to .htaccess or virtual host config
RewriteCond %{REQUEST_URI} \.\./
RewriteRule .* - [F]

🧯 If You Can't Patch

  • Implement strict file permissions on sensitive directories
  • Deploy WAF rules to block directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check Foswiki version via Admin interface or examine lib/Foswiki.pm for version number

Check Version:

grep '\$VERSION' /path/to/foswiki/lib/Foswiki.pm

Verify Fix Applied:

Confirm version is 2.1.8+ or SpreadSheetPlugin is 2.12+ via Admin interface

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\\' patterns
  • Access to unexpected file paths in web logs

Network Indicators:

  • Unusual file access patterns via HTTP requests

SIEM Query:

web_access_logs WHERE url CONTAINS '../' OR url CONTAINS '..\\'

🔗 References

📤 Share & Export