CVE-2023-38348

8.8 HIGH

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Benno MailArchiv web application. Attackers can trick authenticated users into performing unintended actions like configuration changes or data manipulation. All users of the vulnerable version are affected.

💻 Affected Systems

Products:
  • Benno MailArchiv
Versions: 2.10.1 and earlier
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to be authenticated and visit malicious site while logged into Benno MailArchiv.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of mail archiving system including data deletion, configuration tampering, or privilege escalation leading to data exfiltration.

🟠

Likely Case

Unauthorized configuration changes, data manipulation, or disruption of mail archiving operations by tricking administrators.

🟢

If Mitigated

Limited impact with proper CSRF protections, though some risk remains if other vulnerabilities are chained.

🌐 Internet-Facing: HIGH - Web applications exposed to internet are primary targets for CSRF attacks.
🏢 Internal Only: MEDIUM - Internal users could still be tricked via phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement; requires user interaction but no special skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.2 or later

Vendor Advisory: https://wiki.benno-mailarchiv.de/doku.php

Restart Required: Yes

Instructions:

1. Download Benno MailArchiv 2.10.2 or later from vendor portal. 2. Backup current configuration and data. 3. Run installer to upgrade. 4. Restart Benno MailArchiv services.

🔧 Temporary Workarounds

Implement CSRF tokens

all

Add anti-CSRF tokens to all state-changing requests

Requires code modification - consult developer documentation

SameSite cookie attribute

all

Set SameSite=Strict or Lax on session cookies

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with CSRF protection rules
  • Require re-authentication for sensitive operations and use double-submit cookie pattern

🔍 How to Verify

Check if Vulnerable:

Check version in web interface or configuration files; if version is 2.10.1 or earlier, system is vulnerable.

Check Version:

Check web interface or consult Benno MailArchiv administration documentation for version check.

Verify Fix Applied:

Verify version is 2.10.2 or later and test CSRF protection by attempting to submit forms without valid tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same IP
  • Unusual configuration changes without proper authentication logs

Network Indicators:

  • HTTP requests without Referer headers or CSRF tokens
  • Requests originating from unexpected domains

SIEM Query:

source="benno_logs" AND (action="config_change" OR action="data_modify") AND NOT (user_agent contains "benno" OR referer contains "benno-domain")

🔗 References

📤 Share & Export