CVE-2023-35801

8.1 HIGH

📋 TL;DR

A directory traversal vulnerability in Safe Software FME Server allows authenticated attackers with write privileges to bypass validation when editing network-based resource connections, enabling unauthorized reading and writing of arbitrary files. This affects FME Server versions before 2022.2.5 and FME Flow versions before 2023.0. Organizations using these products for data integration and transformation are at risk.

💻 Affected Systems

Products:
  • Safe Software FME Server
  • Safe Software FME Flow
Versions: FME Server versions before 2022.2.5, FME Flow versions before 2023.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have authenticated access with write privileges to network-based resource connections.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file write leading to remote code execution, data exfiltration, or system destruction.

🟠

Likely Case

Unauthorized access to sensitive configuration files, credentials, or data, potentially leading to data theft or further privilege escalation.

🟢

If Mitigated

Limited impact if proper access controls restrict user privileges and network segmentation isolates vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but directory traversal techniques are well-understood and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FME Server 2022.2.5 or later, FME Flow 2023.0 or later

Vendor Advisory: https://community.safe.com/s/article/Known-Issue-FME-Flow-Directory-Traversal-Vulnerability

Restart Required: Yes

Instructions:

1. Download the patched version from Safe Software downloads portal. 2. Backup current configuration and data. 3. Install the patched version following vendor documentation. 4. Restart FME services.

🔧 Temporary Workarounds

Restrict User Privileges

all

Limit write access to network-based resource connections to only essential administrators.

Network Segmentation

all

Isolate FME Server/FME Flow instances from sensitive systems and limit network access.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can edit network-based resource connections.
  • Deploy file integrity monitoring to detect unauthorized file modifications and implement network segmentation.

🔍 How to Verify

Check if Vulnerable:

Check FME Server/FME Flow version via web interface or configuration files. Versions before 2022.2.5 (FME Server) or 2023.0 (FME Flow) are vulnerable.

Check Version:

Check web interface or configuration files for version information. No single command available across all deployments.

Verify Fix Applied:

Confirm version is 2022.2.5 or later for FME Server, or 2023.0 or later for FME Flow. Test directory traversal attempts should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in FME logs
  • Multiple failed directory traversal attempts
  • Unauthorized file modification events

Network Indicators:

  • Unusual outbound connections from FME Server to external systems
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="fme_server" AND (event="file_access" OR event="directory_traversal")

🔗 References

📤 Share & Export