CVE-2023-42387
📋 TL;DR
This vulnerability in TDSQL Chitu management platform allows remote attackers to access sensitive database information through an unsecured function in install.php. It affects organizations using TDSQL Chitu management platform version 10.3.19.5.0. The exposure occurs via the get_db_info function which improperly discloses database configuration details.
💻 Affected Systems
- TDSQL Chitu Management Platform
📦 What is this software?
Tdsql Chitu by Tdsql Chitu Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain database credentials and configuration, leading to full database compromise, data exfiltration, and potential lateral movement to other systems.
Likely Case
Attackers access database connection strings, credentials, and configuration details, enabling unauthorized database access and potential data theft.
If Mitigated
With proper network segmentation and access controls, impact is limited to information disclosure without direct database access.
🎯 Exploit Status
Exploitation requires simple HTTP requests to the vulnerable endpoint without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Remove or restrict access to install.php file after installation completes.
🔧 Temporary Workarounds
Remove install.php file
linuxDelete or rename the vulnerable install.php file after installation
mv /path/to/install.php /path/to/install.php.bak
rm /path/to/install.php
Restrict access via web server
allConfigure web server to block access to install.php
# Apache: Add to .htaccess
<Files "install.php">
Order allow,deny
Deny from all
</Files>
# Nginx: Add to server block
location ~ /install\.php$ {
deny all;
return 403;
}
🧯 If You Can't Patch
- Implement strict network access controls to limit access to management interface
- Monitor and alert on access attempts to install.php endpoint
🔍 How to Verify
Check if Vulnerable:
Attempt to access http://[target]/install.php?action=get_db_info and check for database information disclosure
Check Version:
Check platform version in web interface or configuration files
Verify Fix Applied:
Verify install.php file is removed or returns 403/404 when accessed
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to install.php with get_db_info parameter
- Unusual database connection attempts from web server
Network Indicators:
- HTTP GET requests to /install.php?action=get_db_info
- Outbound database connections from web server to unexpected targets
SIEM Query:
source="web_access.log" AND uri="/install.php" AND query="*get_db_info*"