CVE-2023-6190

9.8 CRITICAL

📋 TL;DR

This path traversal vulnerability allows attackers to access files outside the intended directory by manipulating file paths. It affects İzmir Katip Çelebi University's University Information Management System. Attackers could potentially read sensitive system files or upload malicious files to arbitrary locations.

💻 Affected Systems

Products:
  • İzmir Katip Çelebi University University Information Management System
Versions: All versions before 30.11.2023
Operating Systems: Any OS running the vulnerable software
Default Config Vulnerable: ⚠️ Yes
Notes: Specific deployment configurations unknown, but default installations appear vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary file read/write, leading to data exfiltration, credential theft, or remote code execution.

🟠

Likely Case

Unauthorized access to sensitive configuration files, user data, or system files containing credentials.

🟢

If Mitigated

Limited impact with proper input validation, file permission restrictions, and web application firewalls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version dated 30.11.2023 or later

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-23-0736

Restart Required: Yes

Instructions:

1. Contact İzmir Katip Çelebi University for updated version. 2. Backup current installation. 3. Apply patch/update to version dated 30.11.2023 or later. 4. Restart application services. 5. Verify fix implementation.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation to reject path traversal sequences like ../, ..\, absolute paths, and null bytes.

Web Application Firewall Rules

all

Deploy WAF rules to block path traversal patterns in HTTP requests.

🧯 If You Can't Patch

  • Implement strict file permission controls to limit accessible directories
  • Deploy network segmentation to isolate vulnerable system from sensitive data

🔍 How to Verify

Check if Vulnerable:

Test for path traversal by attempting to access files outside web root using ../ sequences in file parameters.

Check Version:

Check system documentation or contact vendor for version information

Verify Fix Applied:

Retest path traversal attempts after patch; successful attempts should be blocked or return errors.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file access attempts with ../ patterns
  • Unusual file access patterns outside normal directories

Network Indicators:

  • HTTP requests containing ../, ..\, or absolute path patterns in parameters

SIEM Query:

web.url:*../* OR web.uri:*../* OR http.request.uri:*../*

🔗 References

📤 Share & Export