This can be used to read or write to any file on the system that the attacker has permission to access. ALFAFX is especially dangerous for brokers, as it can be exploited to install a malicious binary on the broker and then run arbitrary commands on the broker itself.

ALFAFX can also be used to exploit a vulnerability in the Web Console. By uploading a specially-crafted request with a UNC pathname and an absolute path, the attacker can inject any file on the system into the Web Console, resulting in a potentially critical security issue.

ALFAFX is a generic exploit and can be leveraged against any application that accepts remote file uploads. This most commonly applies to Java applications, but any application that accepts remote file uploads is at risk of exploitation.

Conclusion: Stay Vigilant

Brokers should remain vigilant. If you are using the Web Console, keep in mind that malicious files can be uploaded and executed on your system.
Keep your software updated to stay current with security patches. To avoid installing a malicious binary from ALFAFX, broker should follow these steps:
- Don't allow unauthenticated file uploads
- Make sure to use an authenticated channel (MongoDB administrative user) when performing file uploads
- Use the Web Console to access administrative functions of the broker, but use a different server for uploading sensitive files

Vulnerable versions of ALFAFX

ALFAFX is vulnerable in all versions of the product.

Timeline

Published on: 09/05/2022 16:15:00 UTC
Last modified on: 09/09/2022 15:23:00 UTC

References