CVE-2023-37599

7.5 HIGH

📋 TL;DR

This vulnerability in Issabel PBX allows remote attackers to access sensitive information through the modules directory without authentication. It affects organizations using Issabel PBX for telephony systems, potentially exposing configuration files, credentials, and other sensitive data.

💻 Affected Systems

Products:
  • Issabel PBX
Versions: 4.0.0-6
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Issabel PBX 4.0.0-6. The modules directory is typically accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft leading to unauthorized telephony access, call interception, and lateral movement to connected systems.

🟠

Likely Case

Exposure of configuration files containing database credentials, API keys, and telephony settings that could enable further attacks.

🟢

If Mitigated

Limited information disclosure with no direct path to system compromise if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote access to sensitive files when exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to gain sensitive information, but requires network access to the PBX system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple directory traversal or direct file access via web requests. Public proof-of-concept code is available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Upgrade to a newer version if available or implement workarounds.

🔧 Temporary Workarounds

Restrict modules directory access

linux

Add .htaccess restrictions to prevent unauthorized access to the modules directory

echo 'Deny from all' > /var/www/html/modules/.htaccess
chmod 644 /var/www/html/modules/.htaccess

Web server configuration hardening

linux

Configure web server to deny access to sensitive directories

Add 'location /modules { deny all; }' to nginx config or '<Directory /var/www/html/modules> Require all denied </Directory>' to Apache config

🧯 If You Can't Patch

  • Implement strict network access controls to limit PBX access to authorized users only
  • Monitor access logs for unusual requests to modules directory and implement WAF rules to block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[issabel-ip]/modules/ and check if directory listing or file access is possible

Check Version:

grep 'Version' /etc/issabel-release || issabel-version

Verify Fix Applied:

Verify that accessing /modules/ returns 403 Forbidden or similar access denied error

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /modules/ paths
  • Multiple requests to sensitive file extensions (.conf, .ini, .php) in modules directory

Network Indicators:

  • Unusual GET requests to modules directory from unauthorized IPs
  • Pattern of directory traversal attempts

SIEM Query:

source="web_logs" AND (uri_path="/modules/*" OR uri_path CONTAINS "/modules/") AND status="200"

🔗 References

📤 Share & Export