CVE-2023-3512

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to download arbitrary files from affected systems using relative path traversal in the 'Download file' parameter. It affects Setelsa Security's ConacWin CB version 3.8.2.2 and earlier. Organizations using this software for security management are at risk.

💻 Affected Systems

Products:
  • Setelsa Security ConacWin CB
Versions: 3.8.2.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the file download functionality and affects default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through downloading sensitive files like configuration files, passwords, or system files leading to further attacks.

🟠

Likely Case

Unauthorized access to sensitive configuration data, user credentials, or system information that could facilitate lateral movement.

🟢

If Mitigated

Limited to downloading non-sensitive files if proper file permissions and access controls are implemented.

🌐 Internet-Facing: HIGH if the application is exposed to the internet, as exploitation requires no authentication.
🏢 Internal Only: MEDIUM for internal networks, as attackers would need internal access but exploitation is straightforward.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only manipulating the file download parameter with directory traversal sequences like '../'.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.8.2.3 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin

Restart Required: Yes

Instructions:

1. Download the latest version from Setelsa Security. 2. Backup current configuration. 3. Install the update. 4. Restart the ConacWin CB service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to reject directory traversal sequences in file download requests.

Implement server-side validation to sanitize file paths before processing.

Network Segmentation

all

Restrict network access to ConacWin CB to only authorized users and systems.

Configure firewall rules to limit access to ConacWin CB ports.

🧯 If You Can't Patch

  • Implement strict file system permissions to limit accessible directories.
  • Deploy a web application firewall (WAF) with rules to block path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Test the file download functionality with path traversal payloads like '../../etc/passwd' or similar Windows paths.

Check Version:

Check the ConacWin CB interface or installation directory for version information.

Verify Fix Applied:

Attempt the same path traversal tests after patching; successful downloads should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file download requests containing '../' sequences
  • Multiple failed download attempts from single IPs

Network Indicators:

  • HTTP requests with path traversal patterns in URL parameters

SIEM Query:

source="conacwin_logs" AND (url="*../*" OR parameter="*../*")

🔗 References

📤 Share & Export