CVE-2023-43825
📋 TL;DR
A relative path traversal vulnerability in Shihonkanri Plus allows local attackers to execute arbitrary code by tricking legitimate users into importing malicious backup files. This affects version 9.0.3 and earlier. Attackers need local access and must convince users to import crafted files.
💻 Affected Systems
- Shihonkanri Plus
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Local privilege escalation or malware execution within the application context, potentially compromising sensitive business data managed by the software.
If Mitigated
Limited impact if proper user training prevents importing untrusted files and application runs with minimal privileges.
🎯 Exploit Status
Requires social engineering to get user to import malicious file and local access to place/craft the file.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 9.0.4 or later
Vendor Advisory: http://ekakin.la.coocan.jp/index.htm
Restart Required: Yes
Instructions:
1. Download latest version from vendor website. 2. Backup current data. 3. Install update. 4. Restart system.
🔧 Temporary Workarounds
Restrict backup file imports
allImplement policy to only allow importing backup files from trusted sources with verification.
Run with limited privileges
windowsConfigure application to run with minimal user privileges to limit impact of code execution.
🧯 If You Can't Patch
- Implement strict user training about only importing verified backup files from trusted sources.
- Monitor for suspicious file import activities and restrict application network access.
🔍 How to Verify
Check if Vulnerable:
Check Help > About in Shihonkanri Plus to see if version is 9.0.3 or earlier.
Check Version:
Check application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\ShihonkanriPlus\Version
Verify Fix Applied:
Verify version shows 9.0.4 or later after update installation.
📡 Detection & Monitoring
Log Indicators:
- Unusual backup file import activities
- Process execution from unexpected locations after file import
Network Indicators:
- Unexpected outbound connections after backup import
SIEM Query:
EventID=4688 AND ProcessName="shihonkanri.exe" AND CommandLine CONTAINS "import"