CVE-2024-6400

7.5 HIGH

📋 TL;DR

This vulnerability in Finrota Netahsilat allows attackers to retrieve sensitive information stored in cleartext, bypass authentication, inject IMAP/SMTP commands, and collect data from common resource locations. It affects all Finrota Netahsilat users running vulnerable versions. The vulnerability exposes sensitive data and could lead to complete system compromise.

💻 Affected Systems

Products:
  • Finrota Netahsilat
Versions: All versions before 1.21.10, 1.23.01, 1.23.08, 1.23.11, and 1.24.03
Operating Systems: Any OS running Finrota Netahsilat
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects multiple components including data storage, authentication, and email command processing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data exfiltration of all sensitive information, unauthorized access to email systems via command injection, and authentication bypass allowing administrative access.

🟠

Likely Case

Sensitive data exposure including credentials and personal information, unauthorized access to application functions, and potential email system compromise.

🟢

If Mitigated

Limited data exposure if proper encryption and access controls are implemented, but authentication bypass and command injection risks remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple attack vectors including cleartext data retrieval and authentication bypass suggest relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.21.10, 1.23.01, 1.23.08, 1.23.11, or 1.24.03

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-1611

Restart Required: Yes

Instructions:

1. Download the latest patched version from Finrota. 2. Backup current configuration and data. 3. Stop the Netahsilat service. 4. Install the patched version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

linux

Isolate Finrota Netahsilat from internet and restrict internal access

iptables -A INPUT -p tcp --dport [Netahsilat_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [Netahsilat_port] -j DROP

Disable External Email Functions

all

Temporarily disable IMAP/SMTP functionality to prevent command injection

# Edit configuration to disable IMAP/SMTP services
# Set imap_enabled = false and smtp_enabled = false in config file

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Enable comprehensive logging and monitoring for suspicious activities

🔍 How to Verify

Check if Vulnerable:

Check Netahsilat version against vulnerable versions list. Examine configuration for cleartext storage settings.

Check Version:

# Check version in Netahsilat admin interface or configuration files

Verify Fix Applied:

Verify installed version is 1.21.10, 1.23.01, 1.23.08, 1.23.11, or 1.24.03. Test authentication bypass and data query functions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Multiple failed login attempts followed by success
  • Unexpected data query patterns
  • IMAP/SMTP command errors

Network Indicators:

  • Unusual outbound connections from Netahsilat server
  • Traffic to unexpected ports
  • Large data transfers

SIEM Query:

source="netahsilat.log" AND (event_type="auth_failure" OR event_type="data_query" OR event_type="email_command")

🔗 References

📤 Share & Export