CVE-2023-48310
📋 TL;DR
TestingPlatform versions before 2.1.1 have improper input validation that allows attackers to pass arbitrary nmap options and CIDR blocks. This enables denial of service by overwriting critical files as root and unauthorized network scanning. All users running affected versions are vulnerable.
💻 Affected Systems
- TestingPlatform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Critical system files overwritten as root causing complete system failure, combined with network reconnaissance enabling further attacks.
Likely Case
Denial of service through file corruption and unauthorized network scanning of internal/external targets.
If Mitigated
Limited impact with proper network segmentation and file permission controls.
🎯 Exploit Status
Simple command injection via nmap parameters; no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.1.1
Vendor Advisory: https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download version 2.1.1 from GitHub releases. 3. Replace existing installation with patched version. 4. Restart TestingPlatform service.
🔧 Temporary Workarounds
Restrict nmap options
allConfigure TestingPlatform to only accept specific, safe nmap parameters
Edit configuration to whitelist allowed nmap flags only
File permission hardening
linuxSet restrictive permissions on directories where log files could be created
chmod 755 /var/log/testingplatform
chown testingplatform:testingplatform /var/log/testingplatform
🧯 If You Can't Patch
- Disable TestingPlatform's nmap scanning feature entirely
- Implement strict network segmentation to limit scanning capabilities
🔍 How to Verify
Check if Vulnerable:
Check TestingPlatform version; if <2.1.1, vulnerable. Test by attempting to pass nmap -oN /etc/passwd option.
Check Version:
testingplatform --version or check package manager
Verify Fix Applied:
After upgrade to 2.1.1, attempt to pass malicious nmap options; should be rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual nmap commands in TestingPlatform logs
- File creation in unexpected locations
- Network scanning from TestingPlatform server
Network Indicators:
- Unexpected nmap scans originating from TestingPlatform server
- Traffic to unusual CIDR blocks
SIEM Query:
source="testingplatform" AND (command="-oN" OR cidr="0.0.0.0/0")
🔗 References
- https://github.com/NC3-LU/TestingPlatform/commit/7b3e7ca869a4845aa7445f874c22c5929315c3a7
- https://github.com/NC3-LU/TestingPlatform/releases/tag/v2.1.1
- https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
- https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm
- https://github.com/NC3-LU/TestingPlatform/commit/7b3e7ca869a4845aa7445f874c22c5929315c3a7
- https://github.com/NC3-LU/TestingPlatform/releases/tag/v2.1.1
- https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
- https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm