CVE-2023-39415

7.5 HIGH

📋 TL;DR

This CVE describes an improper authentication vulnerability in Proself products that allows remote unauthenticated attackers to bypass login controls and access the Control Panel. Affected users include all organizations running vulnerable versions of Proself Enterprise/Standard Edition, Gateway Edition, or Mail Sanitize Edition.

💻 Affected Systems

Products:
  • Proself Enterprise Edition
  • Proself Standard Edition
  • Proself Gateway Edition
  • Proself Mail Sanitize Edition
Versions: Enterprise/Standard Edition: 5.61 and earlier, Gateway Edition: 1.62 and earlier, Mail Sanitize Edition: 1.07 and earlier
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable as this is an authentication bypass in the core product.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Proself system allowing attackers to modify configurations, access sensitive data, or disrupt services.

🟠

Likely Case

Unauthorized access to administrative functions leading to data exposure or system manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires network access to the vulnerable interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows direct authentication bypass without requiring complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Enterprise/Standard Edition: 5.62 or later, Gateway Edition: 1.63 or later, Mail Sanitize Edition: 1.08 or later

Vendor Advisory: https://www.proself.jp/information/149/

Restart Required: Yes

Instructions:

1. Download the latest version from Proself vendor site. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the Proself service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Proself Control Panel interface using firewall rules

IP Whitelisting

all

Configure the Control Panel to only accept connections from trusted IP addresses

🧯 If You Can't Patch

  • Isolate the Proself system on a restricted network segment with no internet access
  • Implement strict firewall rules to only allow trusted administrative IPs to access the Control Panel interface

🔍 How to Verify

Check if Vulnerable:

Check the Proself version in the Control Panel or configuration files against affected version ranges

Check Version:

Check the version displayed in the Proself Control Panel interface or configuration files

Verify Fix Applied:

Verify the installed version is 5.62 or later for Enterprise/Standard, 1.63 or later for Gateway, or 1.08 or later for Mail Sanitize Edition

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to Control Panel endpoints
  • Login attempts from unexpected IP addresses
  • Configuration changes from unauthenticated users

Network Indicators:

  • HTTP requests to Control Panel endpoints without authentication headers
  • Traffic to Proself administrative ports from unauthorized sources

SIEM Query:

source="proself" AND (event_type="authentication_failure" OR event_type="configuration_change") AND user="anonymous"

🔗 References

📤 Share & Export