CVE-2023-48373

7.5 HIGH

📋 TL;DR

ITPison OMICARD EDM has a path traversal vulnerability in the 'FileName' parameter that allows unauthenticated remote attackers to bypass authentication and download arbitrary system files. This affects all systems running vulnerable versions of OMICARD EDM software. Attackers can access sensitive files without credentials.

💻 Affected Systems

Products:
  • ITPison OMICARD EDM
Versions: Specific versions not specified in available references
Operating Systems: Unknown - likely Windows-based given EDM software context
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in a specific function with FileName parameter; all deployments with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through retrieval of configuration files, credentials, or sensitive data leading to further attacks on the network.

🟠

Likely Case

Unauthorized access to sensitive files containing system information, configuration data, or potentially credentials.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly exploited with simple HTTP requests; unauthenticated nature makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7592-998bf-1.html

Restart Required: Yes

Instructions:

1. Contact ITPison for patched version 2. Apply vendor-provided patch 3. Restart OMICARD EDM service 4. Verify fix implementation

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OMICARD EDM to trusted IPs only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="PORT" accept'
netsh advfirewall firewall add rule name="OMICARD_EDM" dir=in action=allow protocol=TCP localport=PORT remoteip=TRUSTED_IP

Input Validation via WAF

all

Implement web application firewall rules to block path traversal patterns

WAF rule: block requests containing '../' or '..\' in parameters

🧯 If You Can't Patch

  • Isolate OMICARD EDM system in separate network segment with strict access controls
  • Implement application-level input validation to sanitize FileName parameter

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access system files via crafted FileName parameter (e.g., ../../etc/passwd or ../../windows/win.ini)

Check Version:

Check OMICARD EDM administration interface or contact vendor for version information

Verify Fix Applied:

Retest path traversal attempts after patch; successful requests should return error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with '../' patterns in FileName parameter
  • Unauthenticated file access attempts to system paths

Network Indicators:

  • Unusual file download patterns from OMICARD EDM service
  • Requests for known system files from external sources

SIEM Query:

source="omicard_edm" AND (url="*../*" OR url="*..\\*")

🔗 References

📤 Share & Export