CVE-2023-43176
📋 TL;DR
A deserialization vulnerability in Afterlogic Aurora Files v9.7.3 allows authenticated attackers to execute arbitrary code by uploading a specially crafted .sabredav file. This affects all systems running the vulnerable version of Aurora Files web file management platform. Attackers can achieve remote code execution with authenticated access.
💻 Affected Systems
- Afterlogic Aurora Files
📦 What is this software?
Aurora Files by Afterlogic
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, access sensitive data, pivot to other systems, and maintain persistent access.
Likely Case
Remote code execution leading to data theft, installation of backdoors, or deployment of ransomware on affected systems.
If Mitigated
Limited impact if proper network segmentation, least privilege access, and file upload restrictions are in place.
🎯 Exploit Status
Exploit requires authenticated access. Public proof-of-concept demonstrates reliable exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v9.7.4 or later
Vendor Advisory: http://afterlogic.com
Restart Required: Yes
Instructions:
1. Backup configuration and data. 2. Download latest version from Afterlogic website. 3. Replace vulnerable files with patched version. 4. Restart web server and application services.
🔧 Temporary Workarounds
Restrict file uploads
allBlock upload of .sabredav files at web application firewall or server level
# Example for Apache: AddType .sabredav application/octet-stream
# Example for Nginx: location ~ \.sabredav$ { deny all; }
Implement strict authentication controls
allEnforce strong authentication, MFA, and monitor for suspicious login attempts
🧯 If You Can't Patch
- Isolate Aurora Files instance in segmented network with strict access controls
- Implement application-level WAF rules to detect and block deserialization attacks
🔍 How to Verify
Check if Vulnerable:
Check Aurora Files version in admin panel or by examining application files. Version 9.7.3 is vulnerable.
Check Version:
# Check version in Aurora Files admin interface or examine version.php file
Verify Fix Applied:
Verify version is 9.7.4 or later in admin panel. Test file upload functionality with .sabredav files to ensure they're rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual .sabredav file uploads
- Suspicious POST requests to file upload endpoints
- Unexpected process execution from web server context
Network Indicators:
- HTTP requests with .sabredav file uploads to Aurora Files endpoints
- Outbound connections from web server to unexpected destinations
SIEM Query:
source="web_server" AND (uri="*.sabredav" OR user_agent="*exploit*" OR method="POST" AND uri="*/files/*")
🔗 References
- http://afterlogic.com
- http://aurora.com
- https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1
- https://sec.leonardini.dev/blog/cve-2023-43176-rce_aurora_files/
- http://afterlogic.com
- http://aurora.com
- https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1
- https://sec.leonardini.dev/blog/cve-2023-43176-rce_aurora_files/