CVE-2023-6451
📋 TL;DR
CVE-2023-6451 is an authentication bypass vulnerability in AlayaCare's Procura Portal where attackers can forge authentication cookies using a publicly known cryptographic machine key. This allows unauthorized access to the application without valid credentials. Organizations using Procura Portal versions before 9.0.1.2 are affected.
💻 Affected Systems
- AlayaCare Procura Portal
📦 What is this software?
Procura by Alayacare
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Procura Portal application with unauthorized access to sensitive healthcare data, potential data exfiltration, and system manipulation.
Likely Case
Unauthorized access to patient records, scheduling systems, and administrative functions leading to privacy violations and operational disruption.
If Mitigated
Limited impact with proper network segmentation, monitoring, and quick detection of anomalous authentication patterns.
🎯 Exploit Status
The vulnerability requires knowledge of the machine key, which is publicly known. Attackers can generate valid authentication cookies without any authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.0.1.2
Vendor Advisory: https://www.themissinglink.com.au/security-advisories/cve-2023-6451
Restart Required: Yes
Instructions:
1. Upgrade Procura Portal to version 9.0.1.2 or later. 2. Restart the application services. 3. Regenerate all cryptographic keys and invalidate existing sessions.
🔧 Temporary Workarounds
Network Isolation
allRestrict access to Procura Portal to trusted networks only
Session Invalidation
allForce all users to re-authenticate and invalidate existing sessions
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure
- Deploy web application firewall with authentication bypass detection rules
🔍 How to Verify
Check if Vulnerable:
Check Procura Portal version in application settings or configuration files. Versions below 9.0.1.2 are vulnerable.
Check Version:
Check application configuration or contact AlayaCare support for version verification
Verify Fix Applied:
Verify version is 9.0.1.2 or higher and test authentication mechanisms work correctly.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful login from same IP
- Authentication from unusual locations or user agents
- Session creation without corresponding login events
Network Indicators:
- Unusual authentication patterns
- Requests with forged cookies bypassing normal authentication flow
SIEM Query:
source="procura_logs" AND (event_type="authentication" AND result="success") AND NOT (event_type="login" AND result="success" within 5 minutes)