CVE-2023-39611

7.5 HIGH

📋 TL;DR

This vulnerability in Software FX Chart FX 7 allows attackers to perform directory traversal attacks by sending specially crafted web requests, enabling them to enumerate and read files from the local filesystem. It affects organizations using Chart FX 7 version 7.0.4962.20829, particularly those exposing the software to untrusted networks.

💻 Affected Systems

Products:
  • Software FX Chart FX 7
Versions: 7.0.4962.20829
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web deployments where Chart FX 7 is exposed via HTTP/HTTPS endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or application data, potentially leading to credential theft, data exfiltration, or further system compromise.

🟠

Likely Case

Attackers would enumerate directory structures and read accessible files, potentially obtaining configuration information, logs, or other sensitive data stored in predictable locations.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to files accessible by the application service account within its permitted directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted web requests but does not require authentication. Public technical details are available in the referenced Medium article.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is currently available. Monitor Software FX for security updates and advisories.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Chart FX 7 endpoints to only trusted IP addresses or internal networks.

Web Application Firewall Rules

all

Implement WAF rules to block directory traversal patterns and suspicious file access requests.

🧯 If You Can't Patch

  • Isolate Chart FX 7 servers in a segmented network zone with strict inbound/outbound controls
  • Implement application-level input validation to reject requests containing directory traversal sequences

🔍 How to Verify

Check if Vulnerable:

Check if Chart FX 7 version 7.0.4962.20829 is installed and exposed via web endpoints. Test with controlled directory traversal payloads in a safe environment.

Check Version:

Check application version through Chart FX 7 interface or installation directory properties.

Verify Fix Applied:

Verify that directory traversal payloads no longer return file contents when sent to Chart FX 7 endpoints.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences or unusual file paths
  • Multiple failed file access attempts from single source

Network Indicators:

  • HTTP requests with directory traversal patterns to Chart FX 7 endpoints
  • Unusual file read patterns from web application

SIEM Query:

sourceIP="*" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*") AND destPort="[Chart FX port]"

🔗 References

📤 Share & Export