CVE-2023-39734

8.2 HIGH

📋 TL;DR

CVE-2023-39734 is a client secret leakage vulnerability in VISION MEAT WORKS TrackDiner10/10_mc Line v13.6.1 that allows attackers to obtain channel access tokens and send crafted broadcast messages. This affects organizations using the vulnerable TrackDiner software for LINE integration, potentially enabling unauthorized message broadcasting to customers.

💻 Affected Systems

Products:
  • VISION MEAT WORKS TrackDiner10/10_mc Line
Versions: v13.6.1
Operating Systems: Not OS-specific - affects the application regardless of underlying OS
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the LINE integration component of TrackDiner software used for customer messaging.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete control over LINE messaging capabilities, sending malicious or fraudulent messages to all customers, damaging brand reputation, and enabling phishing campaigns.

🟠

Likely Case

Unauthorized broadcast messages sent to customers, potentially containing spam, misinformation, or malicious links.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though unauthorized message sending remains possible if credentials are compromised.

🌐 Internet-Facing: HIGH - The vulnerability involves LINE API integration which is internet-facing by nature, allowing remote exploitation.
🏢 Internal Only: MEDIUM - While the vulnerability itself may be exploited internally, the primary risk involves external LINE messaging capabilities.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining leaked client secrets, but once obtained, sending crafted messages is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Check with VISION MEAT WORKS for updated versions or security guidance.

🔧 Temporary Workarounds

Regenerate LINE Channel Access Token

all

Immediately regenerate the LINE channel access token to invalidate any compromised credentials

Navigate to LINE Developers Console > Your channel > Messaging API > Issue channel access token > Revoke current token > Issue new token

Rotate Client Secret

all

Generate new client secret in LINE Developers Console and update TrackDiner configuration

LINE Developers Console > Your channel > Basic settings > Channel secret > Issue > Update in TrackDiner config

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the TrackDiner server from unnecessary internet access
  • Enable comprehensive logging and monitoring for unusual LINE API activity or message broadcasting patterns

🔍 How to Verify

Check if Vulnerable:

Check TrackDiner version in application interface or configuration files for v13.6.1

Check Version:

Check application interface or consult TrackDiner documentation for version checking method

Verify Fix Applied:

Verify new channel access token is being used by checking LINE API logs for token usage

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of broadcast messages
  • Messages sent from unexpected IP addresses
  • Failed authentication attempts to LINE API

Network Indicators:

  • Unexpected outbound connections to LINE API endpoints
  • Unusual message volume to LINE messaging endpoints

SIEM Query:

source="trackdiner_logs" AND (event="broadcast_message" AND count > threshold) OR (event="api_call" AND status="unauthorized")

🔗 References

📤 Share & Export