Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SECURITY] Possible 0-Day Path Traversal Vulnerability in Mirth Connect Administrator #6210

Open
ifconfig-me opened this issue May 26, 2024 · 2 comments
Labels

Comments

@ifconfig-me
Copy link

Describe the security issue
A path traversal vulnerability exists in Mirth Connect Administrator that allows an attacker to access arbitrary files on the server. By manipulating the URL, specifically using a sequence of specially crafted semi-encoded payloads attacker can access to sensitive files outside the web root directory.

Vulnerability Location
This vulnerability is in the Mirth Connect codebase itself.

Environment (please complete the following information if it is applicable to the issue)

  • OS: Linux (Debian), Windows 11
  • Java Distribution/Version Java SE 22.0.1
  • Connect Version

Suggested remediation
Sanitize and validate all input URLs to prevent path traversal sequences. Ensure that the URL paths are resolved within the intended directory structure. Additionally, implementing a security mechanism to disallow URL-encoded traversal characters can mitigate this issue.

Additional context
This vulnerability was discovered during a routine security audit. Exploiting this path traversal vulnerability can lead to unauthorized access to sensitive files on the server, potentially exposing critical system and user data.

@pacmano1
Copy link
Collaborator

pacmano1 commented May 26, 2024

What do you mean?

There is:

  • The Mirth Connect Server Process
  • The Mirth Connect Administrattive Launcher
  • The Mirth Connect Administrator tool (why would this have a traversal problem? It is a client UI to manage mirth)

Are you saying the Mirth Connect Server Process has this problem?
What version of Mirth?

Also, is your tool finding: https://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html? An already known and patched CVE in mirth 4.5?

If this is some other finding, I am sure the Nextgen team would like to know the specifics (I don't work for Nextgen) and would appreciate you directly reaching out to them.

@sg-prc
Copy link

sg-prc commented Jun 7, 2024

@ifconfig-me
Do you need to be authenticated to Mirth Connect Administrator for this vuln to be triggered?

@pladesma pladesma added triaged Internal-Issue-Created An issue has been created in NextGen's internal issue tracker RS-12822 and removed triaged Internal-Issue-Created An issue has been created in NextGen's internal issue tracker RS-12822 labels Jun 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants