First published: 18 December 2023
Last update: 20 December 2023
ID: MINDBREEZE29751
Affected Components:
Severity: Critical
Status: Final
CVEs: -
Original publication: https://inspire.mindbreeze.com/support/vulnerabilities/security-update-to-disable-keytab-in-jaas-login-configuration-for-basic-authentication-mindbreeze29751
When using Kerberos authentication for Mindbreeze under Linux, an attacker can in particular circumstances impersonate a user.
This vulnerability only can occur if all of the following circumstances are met:
Fabasoft Mindbreeze Enterprise installed on Microsoft Windows is not affected.
After successful exploitation of this vulnerability, the attacker assimilates the same level of access as the user normally has, gaining access to index search results of this user.
The vulnerability can be remediated by installing the hotfix listed below.
For older Fabasoft Mindbreeze Enterprise versions, a remediation by changing configuration on the Mindbreeze server is available:
If you need further assistance, please open a Fabasoft Support Ticket.
Mindbreeze provides a hotfix for the following Fabasoft Mindbreeze Enterprise version:
Higher versions and build numbers of Fabasoft Mindbreeze Enterprise implicitly include the hotfix.
First published: 20 July 2023 (restricted disclosure)
Last update: 29 August 2023
ID: PDO07741
Affected Components:
Severity: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N Base Score: 7.3
Status: Closed
CVEs: -
During thorough testing of Fabasoft Folio/eGov-Suite a potential cross-site scripting issue has been identified concerning grouped object lists in detail view.
Only Fabasoft Folio/eGov-Suite 2023 Update Rollup 1 and Feature Track are affected, versions below Fabasoft Folio/eGov-Suite 2023 Update Rollup 1 are not affected.
While using a grouped object lists in detail view a potential cross-site scripting (XSS) vulnerability has been identified which could be exploited to inject malicious script code into the installation of Fabasoft Folio/eGov-Suite.
The vulnerability can be remediated by installing a hotfix provided by Fabasoft.
Fabasoft provides hotfixes for the following Fabasoft Folio/eGov-Suite versions:
The fix for this vulnerability is already included with the following and newer versions:
First published: 18 July 2023 (restricted disclosure)
Last update: 29 August 2023 (gs)
ID: CVE-2023-36664
Affected Components:
Severity: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Base Score: 7.8
Status: Open
CVEs: CVE-2023-36664
A security vulnerability has been identified and classified as CVE-2023-36664 that allows the exploitation of Artifex Ghostscript with a specifically crafted PDF document.
On installations of Fabasoft Folio/eGov-Suite that use Artifex Ghostscript as a conversion tool, it is possible that an attacker could exploit this vulnerability in Ghostscript, it is therefore recommended to perform steps to mitigate this scenario.
Based on internal testing, installations of Fabasoft Folio/eGov-Suite 2022 Update Rollup 1 (22.0.1) and newer can successfully perform conversion operations using a version of Artifex Ghostscript that includes a fix for CVE-2023-36664.
Older versions of Fabasoft Folio/eGov-Suite using newer versions of Artifex Ghostscript abort conversion operations with an error.
If an affected system does not support a version of Ghostscript that includes a fix for CVE-2023-36664, it is possible to remove or disable Artifex Ghostscript on the conversion servers, but this operation will also affect or disable some features including the following:
The following versions of Fabasoft Folio and the Fabasoft eGov-Suite can use a fixed version of Artifex Ghostscript as a conversion tool:
The following versions of Fabasoft Folio and the Fabasoft eGov-Suite can use a fixed version of Artifex Ghostscript after the installation of a relevant hotfix:
Other versions are currently being evaluated, future updates to this article may extend the list of compatible versions.
First published: 29 June 2023 (restricted disclosure)
Last update: 29 July 2023
ID: eGov15419
Affected Components:
Severity: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score: 8.8
Status: Closed
CVEs: -
In a Fabasoft eGov-Suite import feature, a normal user is able to configure any import path without restrictions, leading to a possible security issue when restricted operating system files get imported.
Only Fabasoft eGov-Suite systems are affected as this import feature is only available in Fabasoft eGov-Suite.
Fabasoft Folio is not affected by the vulnerability.
After the import, the user will have full access to the imported files. That files usually would be restricted in the original file system folder of the web server.
Due to this import the imported files may be deleted at the original location. This could lead to configuration failures or data loss on the affected webserver.
The vulnerability can be remediated by installing a hotfix provided by Fabasoft.
Fabasoft provides hotfixes for the following Fabasoft Folio/eGov-Suite versions:
The vulernability is directly fixed within the releases of
First published: 8 May 2023 (restricted disclosure)
Last update: 4 July 2023
ID: PDO06614
Affected Components: Fabasoft Folio / Fabasoft eGov-Suite 2021 UR3, Fabasoft Folio / Fabasoft eGov-Suite 2022 (incl. all URs), Fabasoft Folio/eGov-Suite 2023 (incl. UR1), Fabasoft Cloud
Severity: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Total Score: 8,8 HIGH
Status: Final
CVEs: -
A privilege escalation is possible by an intruder on a Microsoft Windows client using the Fabasoft Folio/Cloud Client AutoUpdate-Service (installed with the Fabasoft Folio Client from Fabasoft Folio/eGov-Suite 2021 or the Fabasoft Cloud Enterprise Client).
Affected Fabasoft Folio / Fabasoft eGov-Suite versions:
Versions below Fabasoft Folio / eGov-Suite 2021 Update Rollup 3 are not affected.
Linux and Apple macOS clients are not affected.
In the case the vulnerability could be exploited, malicious software can be installed and executed on the client PC.
Fabasoft provides a hotfix for the Fabasoft Folio Client for the affected Fabasoft Folio / eGov-Suite versions. Please install/roll-out this hotfix immediately. If it is not possible to immediately update the Fabasoft Folio Client, see the possible workaround to disable the Fabasoft Folio Client Update Service below.
The current download of the Fabasoft Cloud Client from the Fabasoft Cloud already includes the hotfixed version of the Fabasoft Cloud Client.
If the Fabasoft Cloud Client is already installed, the update to the hotfixed version is triggered automatically.
Fabasoft provides the hotfixed Fabasoft Folio Client for the affected versions in the following teamroom:
https://at.cloud.fabasoft.com/folio/public/3rz6bra2xcba40s6gt5fishghl
Only the Fabasoft Folio Client on Windows PCs needs to be updated. There is no need to update the Fabasoft Folio / eGov-Suite domain.
The following Fabasoft Folio Client build numbers include the correction:
The affected part of the Fabasoft Folio Client is the Fabasoft Folio Client Update Service, that is installed during the Fabasoft Folio Client installation.
This service is listed under Windows Services as
Set the service startup type to "Disabled" via Group Policy. By disabling these services, the security vulnerability cannot be exploited.
The Fabasoft Folio Client Update Service may not be installed or enabled on your clients, therefore the vulnerability cannot be exploited. Nevertheless we recommend to update the Fabasoft Folio Client.
First published: 25 April 2023 (restricted disclosure)
Last update: 30 May 2023
ID: PDO06544
Affected Components:
Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, Base Score: 9.1
Status: Closed
CVEs: -
When using the integrated LDAP authentication, an attacker can in particular circumstances impersonate a user.
Only systems using the integrated LDAP authentication feature of Fabasoft Folio are affected. It does not affect LDAP authentication via an external SAML identity provider.
The CVSS severity is reduced if LDAP authentication is only available over a local network:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, Base Score: 8.1
After successful exploitation of this vulnerability, the attacker assumes all privileges of the compromised user account, with the same level of access to all objects and actions as the user normally has.
The vulnerability can be remediated by installing one of the hotfixes listed below.
Fabasoft provides hotfixes for the following Fabasoft Folio/eGov-Suite versions:
First published: 23 January 2023
Last update: 25 January 2023
ID: eGov14917
Affected Components:
Severity: CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N, Base Score: 8.1
Status: Final
CVEs: -
An input field of the Time Travel feature in the Fabasoft eGov-Suite is vulnerable to HTML injection and stored cross-site scripting.
To exploit this vulnerability an attacker has to be authenticated as a valid user.
The vulnerability only concerns Fabasoft eGov-Suite, but not Fabasoft Folio.
An attacker could insert HTML or JavaScript code into the affected Time Travel input field of an object (e.g. document). If another user has access to this object and opens the Time Travel feature, the inserted HTML or JavaScript code may be executed in the user’s web browser.
The vulnerability can be remediated by installing one of the hotfixes listed below.
Fabasoft provides hotfixes for the following Fabasoft eGov-Suite versions:
The fix is already included starting with the following Fabasoft eGov-Suite build numbers: