CVE-2023-45560

7.5 HIGH

📋 TL;DR

This vulnerability in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications by exploiting a leaked channel access token. Attackers can abuse this to send unauthorized notifications through the system. Organizations using the vulnerable version of this software are affected.

💻 Affected Systems

Products:
  • Yasukawa memberscard
Versions: v.13.6.1
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with notification functionality enabled and where channel access tokens are improperly secured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send malicious notifications to all users, potentially containing phishing links or misinformation, leading to credential theft or system compromise.

🟠

Likely Case

Attackers send spam or fraudulent notifications to users, damaging trust and potentially causing operational disruption.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to notification spam that can be quickly identified and contained.

🌐 Internet-Facing: HIGH - The vulnerability involves notification channels that are typically internet-accessible, making exploitation straightforward.
🏢 Internal Only: MEDIUM - Internal attackers could abuse this to send misleading notifications within the organization.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires obtaining the leaked channel access token, which may be available through misconfiguration or other vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v.13.6.2 or later

Vendor Advisory: https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45560.md

Restart Required: Yes

Instructions:

1. Download the latest version from the official vendor source. 2. Backup current configuration. 3. Install the updated version. 4. Restart the application service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Notification Channels

all

Temporarily disable vulnerable notification functionality until patching is complete.

Edit configuration to set notification.enabled=false

Restrict Network Access

linux

Limit network access to notification endpoints to trusted IPs only.

iptables -A INPUT -p tcp --dport [notification_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [notification_port] -j DROP

🧯 If You Can't Patch

  • Implement strict access controls on notification endpoints and monitor for unauthorized access attempts.
  • Regularly rotate channel access tokens and audit token usage patterns for anomalies.

🔍 How to Verify

Check if Vulnerable:

Check if running Yasukawa memberscard v.13.6.1 and if notification channels are configured with potentially leaked tokens.

Check Version:

Check application configuration file or admin interface for version information.

Verify Fix Applied:

Verify version is v.13.6.2 or later and test notification functionality with proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unusual notification sending patterns
  • Failed authentication attempts on notification endpoints
  • Access from unexpected IP addresses

Network Indicators:

  • Unexpected traffic to notification endpoints
  • Notification payloads with suspicious content

SIEM Query:

source="memberscard" AND (event="notification_sent" AND user="unknown" OR ip NOT IN [trusted_ips])

🔗 References

📤 Share & Export