CVE-2023-3744

9.9 CRITICAL

📋 TL;DR

CVE-2023-3744 is a Server-Side Request Forgery vulnerability in SLims 9.6.0 that allows authenticated attackers to make requests to internal services or read files via the scrape_image.php file. This affects all SLims 9.6.0 installations with the vulnerable component enabled. Attackers can potentially access sensitive internal systems or exfiltrate data.

💻 Affected Systems

Products:
  • SLims
Versions: 9.6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the SLims application. The scrape_image.php file must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network services, data exfiltration from internal systems, and potential lateral movement to other critical infrastructure.

🟠

Likely Case

Unauthorized access to internal services, file disclosure from accessible systems, and potential credential harvesting from internal endpoints.

🟢

If Mitigated

Limited to authenticated user access only, with network segmentation preventing access to critical internal systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.6.1 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-slims

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download SLims 9.6.1 or later from official source. 3. Replace affected files. 4. Restart web server. 5. Verify functionality.

🔧 Temporary Workarounds

Disable scrape_image.php

linux

Remove or restrict access to the vulnerable scrape_image.php file

mv /path/to/slims/scrape_image.php /path/to/slims/scrape_image.php.disabled

Implement input validation

all

Add strict URL validation to the imageURL parameter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SLims from internal services
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if SLims version is 9.6.0 and scrape_image.php exists in the installation directory

Check Version:

Check SLims configuration file or admin panel for version information

Verify Fix Applied:

Verify SLims version is 9.6.1 or later and test that scrape_image.php properly validates URLs

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to scrape_image.php with external/internal URLs
  • Multiple failed authentication attempts followed by scrape_image.php access

Network Indicators:

  • Outbound connections from SLims server to internal services not normally accessed
  • Unusual traffic patterns from SLims to internal network segments

SIEM Query:

source="slims_access.log" AND uri="/scrape_image.php" AND (url="*://*" OR url="*://127.*" OR url="*://192.168.*" OR url="*://10.*" OR url="*://172.16.*")

🔗 References

📤 Share & Export