CVE-2023-46307

7.5 HIGH

📋 TL;DR

CVE-2023-46307 is a directory traversal vulnerability in etcd-browser that allows attackers to read arbitrary files on the server by manipulating URL paths with sequences like /../../../. This affects anyone running the vulnerable version of etcd-browser exposed to untrusted networks.

💻 Affected Systems

Products:
  • etcd-browser
Versions: Version 87ae63d75260 and likely earlier versions
Operating Systems: Any OS running etcd-browser
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Docker container versions from hub.docker.com/r/buddho/etcd-browser

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like SSH keys, configuration files, or credentials, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive system files, configuration data, or application secrets stored on the server.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request manipulation required. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to etcd-browser to trusted networks only

iptables -A INPUT -p tcp --dport <etcd-port> -s <trusted-network> -j ACCEPT
iptables -A INPUT -p tcp --dport <etcd-port> -j DROP

Reverse Proxy with Path Validation

all

Use a reverse proxy like nginx to filter malicious path traversal attempts

location / {
    proxy_pass http://localhost:<etcd-port>;
    if ($request_uri ~* "\.\.") {
        return 403;
    }
}

🧯 If You Can't Patch

  • Remove etcd-browser from internet-facing networks immediately
  • Implement strict network segmentation and monitor for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Test with curl: curl -v 'http://<target>:<port>/../../../etc/passwd' and check if file contents are returned

Check Version:

Check Docker container tag or application version in running instance

Verify Fix Applied:

Retest with same curl command after implementing workarounds - should receive 403/404 error

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing /../../../ patterns
  • Unusual file access patterns from etcd-browser process

Network Indicators:

  • HTTP GET requests with multiple directory traversal sequences

SIEM Query:

source="etcd-browser" AND uri="*../*"

🔗 References

📤 Share & Export