CVE-2023-47619

8.1 HIGH

📋 TL;DR

CVE-2023-47619 is a critical vulnerability in Audiobookshelf where users with update permissions can read arbitrary files, delete arbitrary files, and make unauthorized GET requests to external URLs. This leads to information disclosure and potential system compromise. All Audiobookshelf instances running version 2.4.3 or earlier are affected.

💻 Affected Systems

Products:
  • Audiobookshelf
Versions: 2.4.3 and prior
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with update permissions. Default installations grant update permissions to admin users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files (including configuration files with credentials), delete critical system files causing service disruption, and use the server as a proxy for attacks on internal networks or external systems.

🟠

Likely Case

Unauthorized access to sensitive audiobook metadata, user data, and configuration files. Potential for credential theft from configuration files.

🟢

If Mitigated

Limited to authorized users with update permissions only, restricting impact to what those users could already access through legitimate means.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with update permissions. GitHub Security Lab has published detailed advisories with proof-of-concept information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/

Restart Required: Yes

Instructions:

No official patch available. Monitor the Audiobookshelf GitHub repository for updates and apply when available. Restart service after patching.

🔧 Temporary Workarounds

Restrict User Permissions

all

Remove update permissions from all non-essential users. Only grant update permissions to absolutely necessary administrative accounts.

Network Segmentation

all

Place Audiobookshelf instances in isolated network segments to limit potential lateral movement and external request capabilities.

🧯 If You Can't Patch

  • Immediately audit and restrict all user accounts with update permissions to only essential administrative users
  • Implement strict network controls to prevent the server from making outbound requests to arbitrary URLs

🔍 How to Verify

Check if Vulnerable:

Check Audiobookshelf version. If version is 2.4.3 or earlier, the system is vulnerable.

Check Version:

Check the Audiobookshelf web interface settings page or examine package/container version

Verify Fix Applied:

When patch becomes available, verify version is greater than 2.4.3 and test that users with update permissions can no longer perform arbitrary file operations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from non-admin users
  • GET requests to unexpected external domains
  • File deletion operations in application logs

Network Indicators:

  • Outbound HTTP requests from Audiobookshelf server to unusual domains
  • Unusual file access patterns via network monitoring

SIEM Query:

source="audiobookshelf" AND (event="file_read" OR event="file_delete" OR event="external_request") AND user!="admin"

🔗 References

📤 Share & Export