CVE-2023-6451

8.6 HIGH

📋 TL;DR

CVE-2023-6451 is an authentication bypass vulnerability in AlayaCare's Procura Portal where attackers can forge authentication cookies using a publicly known cryptographic machine key. This allows unauthorized access to the application without valid credentials. Organizations using Procura Portal versions before 9.0.1.2 are affected.

💻 Affected Systems

Products:
  • AlayaCare Procura Portal
Versions: All versions before 9.0.1.2
Operating Systems: Any OS running Procura Portal
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Procura Portal application with unauthorized access to sensitive healthcare data, potential data exfiltration, and system manipulation.

🟠

Likely Case

Unauthorized access to patient records, scheduling systems, and administrative functions leading to privacy violations and operational disruption.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and quick detection of anomalous authentication patterns.

🌐 Internet-Facing: HIGH - The vulnerability allows authentication bypass, making internet-facing instances particularly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or compromised internal systems, but have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires knowledge of the machine key, which is publicly known. Attackers can generate valid authentication cookies without any authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.1.2

Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-6451

Restart Required: Yes

Instructions:

1. Upgrade Procura Portal to version 9.0.1.2 or later. 2. Restart the application services. 3. Regenerate all cryptographic keys and invalidate existing sessions.

🔧 Temporary Workarounds

Network Isolation

all

Restrict access to Procura Portal to trusted networks only

Session Invalidation

all

Force all users to re-authenticate and invalidate existing sessions

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy web application firewall with authentication bypass detection rules

🔍 How to Verify

Check if Vulnerable:

Check Procura Portal version in application settings or configuration files. Versions below 9.0.1.2 are vulnerable.

Check Version:

Check application configuration or contact AlayaCare support for version verification

Verify Fix Applied:

Verify version is 9.0.1.2 or higher and test authentication mechanisms work correctly.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from same IP
  • Authentication from unusual locations or user agents
  • Session creation without corresponding login events

Network Indicators:

  • Unusual authentication patterns
  • Requests with forged cookies bypassing normal authentication flow

SIEM Query:

source="procura_logs" AND (event_type="authentication" AND result="success") AND NOT (event_type="login" AND result="success" within 5 minutes)

🔗 References

📤 Share & Export