CVE-2023-41638

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to the Gestione Documentale module in RealGimm 1.1.37p38, potentially leading to remote code execution. Organizations using this specific version of RealGimm's document management module are affected.

💻 Affected Systems

Products:
  • GruppoSCAI RealGimm
Versions: 1.1.37p38
Operating Systems: Not specified - likely any OS running RealGimm
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Gestione Documentale (Document Management) module. Other modules may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Attackers upload web shells or malicious scripts to execute commands, steal sensitive data, or deploy ransomware.

🟢

If Mitigated

File uploads are blocked or properly validated, preventing malicious file execution while maintaining legitimate functionality.

🌐 Internet-Facing: HIGH - If the vulnerable module is exposed to the internet, attackers can directly exploit it without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the file upload functionality. The GitHub references contain detailed proof-of-concept information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not found in provided references

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. Apply any available patches for RealGimm 1.1.37p38
3. Verify the fix by testing file upload functionality

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file type validation and size limits on the Gestione Documentale module

Web Application Firewall Rules

all

Deploy WAF rules to block malicious file upload patterns and suspicious requests

🧯 If You Can't Patch

  • Disable or restrict access to the Gestione Documentale module entirely
  • Implement network segmentation to isolate RealGimm servers from critical systems

🔍 How to Verify

Check if Vulnerable:

Check if RealGimm version is 1.1.37p38 and test file upload functionality with malicious file types

Check Version:

Check RealGimm administration panel or configuration files for version information

Verify Fix Applied:

Test file upload with various file types to ensure only allowed extensions are accepted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads, especially with executable extensions
  • Multiple failed upload attempts
  • Uploads from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to document upload endpoints with suspicious file names
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="realgimm" AND (url="*upload*" OR url="*document*" OR method="POST") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp" OR file_extension="exe")

🔗 References

📤 Share & Export