CVE-2023-43661
📋 TL;DR
CVE-2023-43661 is a critical remote code execution vulnerability in Cachet status page systems. It allows authenticated users to execute arbitrary code on the server due to improper template filtering and an outdated Twig version. This affects all Cachet installations prior to version 2.4.
💻 Affected Systems
- Cachet
📦 What is this software?
Cachet by All Three
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise allowing attacker to execute arbitrary commands, access sensitive data, install malware, or pivot to other systems.
Likely Case
Server takeover leading to data theft, service disruption, or deployment of ransomware/cryptominers.
If Mitigated
Limited impact if proper network segmentation and least privilege access controls are implemented.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4 and later
Vendor Advisory: https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p
Restart Required: Yes
Instructions:
1. Backup your Cachet installation and database. 2. Update to Cachet version 2.4 or later. 3. Restart the web server/service. 4. Verify the patch is applied by checking the version.
🔧 Temporary Workarounds
Disable template functionality
allTemporarily disable the template creation/editing feature until patching can be completed.
# Modify Cachet configuration to disable template features
# Check Cachet documentation for specific configuration options
Restrict user permissions
allLimit template creation/editing permissions to only essential administrators.
# Review and modify user roles in Cachet admin panel
# Remove template permissions from non-essential users
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Cachet instances from critical systems
- Enable detailed logging and monitoring for template-related activities and unusual server behavior
🔍 How to Verify
Check if Vulnerable:
Check Cachet version via admin panel or by examining the installation files. Versions below 2.4 are vulnerable.
Check Version:
Check Cachet admin dashboard or examine composer.json file for version information
Verify Fix Applied:
Confirm version is 2.4 or higher and verify commit 6fb043e109d2a262ce3974e863c54e9e5f5e0587 is present in the codebase.
📡 Detection & Monitoring
Log Indicators:
- Unusual template creation/modification activities
- Suspicious PHP/Twig execution patterns
- Unexpected system command execution
Network Indicators:
- Unusual outbound connections from Cachet server
- Suspicious payloads in HTTP requests to template endpoints
SIEM Query:
source="cachet-logs" AND (event="template_creation" OR event="template_modification") AND user!="admin"
🔗 References
- https://github.com/cachethq/cachet/commit/6fb043e109d2a262ce3974e863c54e9e5f5e0587
- https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p
- https://github.com/cachethq/cachet/commit/6fb043e109d2a262ce3974e863c54e9e5f5e0587
- https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p