CVE-2023-4097

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to upload arbitrary files to the affected application, potentially leading to remote code execution or system compromise. It affects IDM Sistemas QSIGE software users who have file upload functionality enabled. Attackers need valid credentials to exploit this flaw.

💻 Affected Systems

Products:
  • IDM Sistemas QSIGE
Versions: Specific versions not detailed in provided references
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Requires file upload functionality to be enabled and accessible to authenticated users

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Malicious file upload leading to web shell installation, data exfiltration, or lateral movement

🟢

If Mitigated

Limited impact with proper file type validation and execution restrictions in place

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once credentials are obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige

Restart Required: Yes

Instructions:

1. Contact IDM Sistemas for patched version 2. Apply vendor-provided patch 3. Restart application services 4. Verify fix implementation

🔧 Temporary Workarounds

Implement file type validation

all

Restrict uploads to specific file extensions and validate file content

Restrict upload directory permissions

linux

Set upload directories to read-only for web server and prevent execution

chmod 644 /path/to/uploads/*
chown root:root /path/to/uploads

🧯 If You Can't Patch

  • Disable file upload functionality entirely if not required
  • Implement web application firewall rules to block suspicious upload patterns

🔍 How to Verify

Check if Vulnerable:

Test authenticated file upload with disallowed file types (e.g., .php, .exe) and check if they are accepted

Check Version:

Check application version through admin interface or configuration files

Verify Fix Applied:

Attempt same file upload tests after patch and verify they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads, especially executable files or scripts
  • Multiple failed login attempts followed by successful uploads

Network Indicators:

  • POST requests to upload endpoints with suspicious file extensions
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND (uri="/upload" OR uri="/fileupload") AND (filename="*.php" OR filename="*.exe" OR filename="*.jsp")

🔗 References

📤 Share & Export