CVE-2023-49964

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to perform Server-Side Template Injection (SSTI) attacks in Hyland Alfresco Community Edition by inserting malicious content in folder.get.html.ftl files. Successful exploitation can lead to Remote Code Execution (RCE), enabling attackers to execute arbitrary commands on affected systems. Organizations running Alfresco Community Edition versions through 7.2.0 are affected.

💻 Affected Systems

Products:
  • Hyland Alfresco Community Edition
Versions: through 7.2.0
Operating Systems: All platforms running Alfresco
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability exists due to an incomplete fix for CVE-2020-12873. All default installations within the affected version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the Alfresco server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized access to sensitive documents, configuration files, and potential privilege escalation within the Alfresco environment.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the Alfresco application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to upload or modify template files. Public proof-of-concept code is available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.2.0

Vendor Advisory: https://www.alfresco.com/products/community/download

Restart Required: Yes

Instructions:

1. Upgrade to Alfresco Community Edition version newer than 7.2.0. 2. Apply the latest security patches from Hyland. 3. Restart all Alfresco services after patching.

🔧 Temporary Workarounds

Restrict Template File Uploads

all

Implement strict file upload controls to prevent unauthorized modification of .ftl template files

Network Segmentation

all

Isolate Alfresco servers from critical infrastructure and implement strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized template file modifications
  • Deploy web application firewall (WAF) with SSTI detection rules

🔍 How to Verify

Check if Vulnerable:

Check Alfresco version via admin console or by examining installation files. Versions 7.2.0 and earlier are vulnerable.

Check Version:

Check Alfresco version in admin interface or via alfresco-global.properties file

Verify Fix Applied:

Verify version is newer than 7.2.0 and test template file upload restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unusual template file modifications
  • Suspicious FreeMarker template execution
  • Unexpected system command execution

Network Indicators:

  • Unusual outbound connections from Alfresco server
  • Suspicious payloads in HTTP requests to template endpoints

SIEM Query:

source="alfresco" AND (event="template_modification" OR event="freemarker_execution")

🔗 References

📤 Share & Export