CVE-2023-48657
📋 TL;DR
This CVE describes a time-based SQL injection vulnerability in MISP's filter handling in app/Model/AppModel.php. Attackers can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration or system compromise. All MISP instances running versions before 2.4.176 are affected.
💻 Affected Systems
- MISP (Malware Information Sharing Platform)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full database compromise leading to exfiltration of sensitive threat intelligence data, user credentials, and potential remote code execution on the underlying server.
Likely Case
Data exfiltration from MISP database including threat intelligence, user information, and potentially authentication data.
If Mitigated
Limited impact with proper network segmentation, database permissions, and monitoring in place.
🎯 Exploit Status
Exploitation requires authenticated access to MISP. The vulnerability is in filter handling which is commonly used in MISP interfaces.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.4.176
Vendor Advisory: https://github.com/MISP/MISP/commit/08bd23281ead288de678de666ef43ed6de1899fc
Restart Required: Yes
Instructions:
1. Backup your MISP instance and database. 2. Update MISP to version 2.4.176 or later using git pull or package manager. 3. Run the update scripts. 4. Restart the web server and MISP workers.
🔧 Temporary Workarounds
Restrict User Access
allLimit MISP access to only trusted users and implement strict authentication controls.
Network Segmentation
allPlace MISP instance behind VPN or restrict access to specific IP addresses.
🧯 If You Can't Patch
- Implement strict network access controls to limit who can access the MISP instance
- Enable detailed SQL query logging and monitor for suspicious database activity
🔍 How to Verify
Check if Vulnerable:
Check MISP version via web interface or by examining the version file in the installation directory.
Check Version:
grep -i version /var/www/MISP/app/Config/config.php 2>/dev/null || cat /var/www/MISP/VERSION.json 2>/dev/null
Verify Fix Applied:
Verify version is 2.4.176 or later and check that the commit 08bd23281ead288de678de666ef43ed6de1899fc is applied.
📡 Detection & Monitoring
Log Indicators:
- Unusually long SQL queries in database logs
- Multiple failed login attempts followed by filter-related requests
- Time-delayed responses to filter requests
Network Indicators:
- Unusual patterns in HTTP requests to filter endpoints
- Large volume of database queries from web application
SIEM Query:
source="misp_logs" AND ("filter" OR "AppModel") AND response_time>5000
🔗 References
- https://github.com/MISP/MISP/commit/08bd23281ead288de678de666ef43ed6de1899fc
- https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
- https://zigrin.com/advisories/misp-time-based-sql-injection-in-logs-index/
- https://github.com/MISP/MISP/commit/08bd23281ead288de678de666ef43ed6de1899fc
- https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
- https://zigrin.com/advisories/misp-time-based-sql-injection-in-logs-index/