CVE-2023-37646

7.8 HIGH

📋 TL;DR

This vulnerability in Bitberry File Opener v23.0 allows attackers to perform directory traversal attacks through CAB file extraction. Attackers can write arbitrary files outside the intended extraction directory, potentially leading to remote code execution. All users of the affected version are vulnerable when processing malicious CAB files.

💻 Affected Systems

Products:
  • Bitberry File Opener
Versions: v23.0
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the CAB extraction function specifically. All installations with default settings are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, allowing complete system compromise, data theft, and lateral movement.

🟠

Likely Case

Arbitrary file write leading to privilege escalation, configuration file modification, or planting of persistent backdoors.

🟢

If Mitigated

Limited to file writes in user-controlled directories if proper sandboxing and file permission restrictions are enforced.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open a malicious CAB file. Public proof-of-concept demonstrates directory traversal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://bitberry.com

Restart Required: No

Instructions:

1. Check vendor website for updated version
2. Uninstall vulnerable version
3. Install patched version if available
4. Verify CAB file extraction is restricted to intended directories

🔧 Temporary Workarounds

Disable CAB file handling

all

Remove or modify file associations to prevent Bitberry File Opener from processing CAB files

Use alternative file opener

all

Configure system to use a different, patched application for CAB file extraction

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Deploy endpoint detection and response (EDR) to monitor for suspicious file write operations

🔍 How to Verify

Check if Vulnerable:

Check application version in settings/about dialog. If version is 23.0, system is vulnerable.

Check Version:

Check application GUI or installation directory for version information

Verify Fix Applied:

Test with known malicious CAB file payload and verify files cannot be written outside extraction directory.

📡 Detection & Monitoring

Log Indicators:

  • File write operations outside expected extraction directories
  • CAB file processing errors with path traversal patterns

Network Indicators:

  • Download of CAB files from untrusted sources
  • Unusual outbound connections after CAB file processing

SIEM Query:

process_name:"bitberry" AND file_write:*\..\* OR file_write:*../*

🔗 References

📤 Share & Export