CVE-2023-42229

6.5 MEDIUM

📋 TL;DR

Pat Infinite Solutions HelpdeskAdvanced versions up to 11.0.33 contain a directory traversal vulnerability in the WSConnector SOAP service. Authenticated attackers can create arbitrary files on the system, potentially leading to remote code execution or data manipulation. Organizations using affected versions of this helpdesk software are at risk.

💻 Affected Systems

Products:
  • Pat Infinite Solutions HelpdeskAdvanced
Versions: <= 11.0.33
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the WSConnector SOAP service endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker achieves remote code execution by writing malicious files to critical system locations, leading to complete system compromise.

🟠

Likely Case

Attacker creates or overwrites configuration files, web shells, or other malicious content to establish persistence or disrupt operations.

🟢

If Mitigated

With proper network segmentation and least privilege authentication, impact limited to isolated helpdesk application data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but uses standard SOAP requests with directory traversal payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 11.0.33

Vendor Advisory: https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md

Restart Required: Yes

Instructions:

1. Download latest version from vendor
2. Backup current installation and data
3. Install updated version following vendor documentation
4. Restart application services

🔧 Temporary Workarounds

Restrict WSConnector Access

all

Block or restrict access to the WSConnector SOAP service endpoint

# Firewall rule example for Linux
iptables -A INPUT -p tcp --dport [WS_PORT] -j DROP
# Or restrict to specific IPs
iptables -A INPUT -p tcp --dport [WS_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [WS_PORT] -j DROP

Disable SOAP Service

linux

Temporarily disable the vulnerable WSConnector service if not required

# Check service status
systemctl status helpdesk-wsconnector
# Stop service
systemctl stop helpdesk-wsconnector
# Disable auto-start
systemctl disable helpdesk-wsconnector

🧯 If You Can't Patch

  • Implement strict network access controls to limit WSConnector service to trusted IPs only
  • Enforce strong authentication policies and monitor for suspicious SOAP requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check HelpdeskAdvanced version in admin interface or configuration files. If version <= 11.0.33 and WSConnector service is accessible, system is vulnerable.

Check Version:

Check admin dashboard or configuration files for version information

Verify Fix Applied:

Verify version is > 11.0.33 and test SOAP requests with directory traversal payloads no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP requests to WSConnector endpoint
  • File creation/modification events in unexpected directories
  • Authentication logs showing suspicious user activity

Network Indicators:

  • SOAP requests containing directory traversal sequences (../, ..\)
  • Unusual file upload patterns via SOAP

SIEM Query:

source="helpdesk_logs" AND (uri="*WSConnector*" AND (payload="*../*" OR payload="*..\*"))

🔗 References

📤 Share & Export