CVE-2023-38348
📋 TL;DR
This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Benno MailArchiv web application. Attackers can trick authenticated users into performing unintended actions like configuration changes or data manipulation. All users of the vulnerable version are affected.
💻 Affected Systems
- Benno MailArchiv
📦 What is this software?
Benno Mailarchiv by Lw Systems
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of mail archiving system including data deletion, configuration tampering, or privilege escalation leading to data exfiltration.
Likely Case
Unauthorized configuration changes, data manipulation, or disruption of mail archiving operations by tricking administrators.
If Mitigated
Limited impact with proper CSRF protections, though some risk remains if other vulnerabilities are chained.
🎯 Exploit Status
CSRF attacks are well-understood and easy to implement; requires user interaction but no special skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.10.2 or later
Vendor Advisory: https://wiki.benno-mailarchiv.de/doku.php
Restart Required: Yes
Instructions:
1. Download Benno MailArchiv 2.10.2 or later from vendor portal. 2. Backup current configuration and data. 3. Run installer to upgrade. 4. Restart Benno MailArchiv services.
🔧 Temporary Workarounds
Implement CSRF tokens
allAdd anti-CSRF tokens to all state-changing requests
Requires code modification - consult developer documentation
SameSite cookie attribute
allSet SameSite=Strict or Lax on session cookies
Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly
🧯 If You Can't Patch
- Implement web application firewall (WAF) with CSRF protection rules
- Require re-authentication for sensitive operations and use double-submit cookie pattern
🔍 How to Verify
Check if Vulnerable:
Check version in web interface or configuration files; if version is 2.10.1 or earlier, system is vulnerable.
Check Version:
Check web interface or consult Benno MailArchiv administration documentation for version check.
Verify Fix Applied:
Verify version is 2.10.2 or later and test CSRF protection by attempting to submit forms without valid tokens.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed state-changing requests from same IP
- Unusual configuration changes without proper authentication logs
Network Indicators:
- HTTP requests without Referer headers or CSRF tokens
- Requests originating from unexpected domains
SIEM Query:
source="benno_logs" AND (action="config_change" OR action="data_modify") AND NOT (user_agent contains "benno" OR referer contains "benno-domain")