CVE-2023-48929

9.8 CRITICAL

📋 TL;DR

This session fixation vulnerability in Franklin Fueling Systems System Sentinel AnyWare allows attackers to hijack user sessions by manipulating the 'sid' parameter. Attackers can escalate privileges and access sensitive information. Organizations using SSA version 1.6.24.492 are affected.

💻 Affected Systems

Products:
  • Franklin Fueling Systems System Sentinel AnyWare
Versions: Version 1.6.24.492
Operating Systems: Not OS-specific - web application vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of the System Sentinel AnyWare platform

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access, data theft, and potential disruption of fueling operations

🟠

Likely Case

Unauthorized access to sensitive fueling system data and configuration information

🟢

If Mitigated

Limited impact with proper session management and network segmentation in place

🌐 Internet-Facing: HIGH - Web interface accessible externally makes exploitation straightforward
🏢 Internal Only: MEDIUM - Internal attackers could still exploit if they have network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial access to the application but session fixation is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact Franklin Fueling Systems for security updates and patching guidance

🔧 Temporary Workarounds

Implement proper session management

all

Configure the application to generate new session IDs upon authentication and invalidate old sessions

Network segmentation

all

Restrict access to the SSA web interface to authorized networks only

🧯 If You Can't Patch

  • Implement web application firewall rules to detect and block session fixation attempts
  • Monitor for unusual session activity and implement strict access controls

🔍 How to Verify

Check if Vulnerable:

Check if accessing group_status.asp with manipulated 'sid' parameter allows session hijacking

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Test that session IDs are properly regenerated upon authentication and old sessions are invalidated

📡 Detection & Monitoring

Log Indicators:

  • Multiple session IDs from same user, unusual session creation patterns

Network Indicators:

  • Repeated requests to group_status.asp with different sid parameters

SIEM Query:

web_requests url="*group_status.asp*" AND (parameter="sid" OR session_anomaly=true)

🔗 References

📤 Share & Export