CVE-2023-38019

8.1 HIGH

📋 TL;DR

This directory traversal vulnerability in IBM SOAR QRadar Plugin App allows remote attackers to read arbitrary files on the system by sending specially crafted URL requests containing directory traversal sequences. Affected organizations are those running IBM SOAR QRadar Plugin App versions 1.0 through 5.0.3.

💻 Affected Systems

Products:
  • IBM SOAR QRadar Plugin App
Versions: 1.0 through 5.0.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable by default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via reading sensitive files like configuration files, credentials, SSH keys, or other authentication tokens, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive configuration files, logs, or other system files containing operational data or limited credentials.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place, potentially only exposing non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are commonly exploited and require minimal technical skill. The vulnerability is unauthenticated, making it particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.4 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7111679

Restart Required: Yes

Instructions:

1. Download IBM SOAR QRadar Plugin App version 5.0.4 or later from IBM Fix Central. 2. Follow IBM's upgrade documentation for your specific deployment. 3. Restart the application services after installation.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the IBM SOAR QRadar Plugin App to only trusted IP addresses and networks using firewall rules.

Web Application Firewall

all

Deploy a WAF with rules to block directory traversal patterns (../, ..\, etc.) in URL requests.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from sensitive networks and the internet.
  • Deploy file system monitoring and integrity checking to detect unauthorized file access attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM SOAR QRadar Plugin App via the application interface or configuration files. If version is between 1.0 and 5.0.3 inclusive, the system is vulnerable.

Check Version:

Check the application's admin interface or configuration files for version information (specific command varies by deployment).

Verify Fix Applied:

After patching, verify the version shows 5.0.4 or later. Test with controlled directory traversal attempts to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ or ..\ sequences in URLs
  • Failed file access attempts to sensitive paths
  • Unusual file read operations from web application logs

Network Indicators:

  • HTTP requests with URL-encoded directory traversal patterns (%2e%2e%2f, etc.)
  • Traffic spikes to the application from unexpected sources

SIEM Query:

source="web_logs" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*" OR url="*%2e%2e%5c*")

🔗 References

📤 Share & Export