CVE-2024-4300

9.8 CRITICAL

📋 TL;DR

CVE-2024-4300 is a critical information disclosure vulnerability in E-WEBInformationCo. FS-EZViewer(Web) that exposes database configuration files containing credentials and connection details. Remote attackers can access these files without authentication, potentially gaining full database control. Organizations using this software are affected.

💻 Affected Systems

Products:
  • E-WEBInformationCo. FS-EZViewer(Web)
Versions: Specific versions not specified in references, likely multiple versions affected
Operating Systems: Windows (based on typical deployment patterns)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration where database configuration files are accessible via web server.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, destruction, or ransomware deployment across connected systems.

🟠

Likely Case

Attackers exfiltrate sensitive data, modify records, or establish persistence for future attacks.

🟢

If Mitigated

Limited impact if database is isolated, credentials are rotated, and access is restricted.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal or direct URL access to configuration files; no special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7774-fbd01-1.html

Restart Required: Yes

Instructions:

1. Contact vendor for patched version. 2. Apply update following vendor instructions. 3. Restart affected services. 4. Rotate database credentials.

🔧 Temporary Workarounds

Restrict web directory access

all

Block access to configuration file paths via web server configuration

For Apache: <LocationMatch "\.(config|ini|xml)$">
    Require all denied
</LocationMatch>
For Nginx: location ~*\.(config|ini|xml)$ {
    deny all;
}

Move configuration files

linux

Relocate sensitive configuration files outside web-accessible directories

mv /var/www/html/config/database.conf /etc/fs-ezviewer/
Update application configuration to reference new path

🧯 If You Can't Patch

  • Implement network segmentation to isolate FS-EZViewer from critical databases
  • Deploy web application firewall (WAF) rules to block access to configuration file patterns

🔍 How to Verify

Check if Vulnerable:

Attempt to access /config/database.conf or similar configuration files via web browser or curl without authentication

Check Version:

Check application interface or documentation for version information

Verify Fix Applied:

Verify configuration files are no longer accessible via web interface and test application functionality

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses for configuration file requests
  • Unusual database connection attempts from web server IP

Network Indicators:

  • GET requests for .conf, .ini, or .xml files in web paths
  • Sudden database traffic spikes from application server

SIEM Query:

source="web_logs" AND (uri="*.conf" OR uri="*.ini" OR uri="*.xml") AND response="200"

🔗 References

📤 Share & Export