MCL-Net 4.3.5.8788 - Information Disclosure

Exploit Author: Victor A. Morales Analysis Author: www.bubbleslearn.ir Category: WebApps Language: Unknown Published Date: 2023-06-23
# Exploit Title: MCL-Net 4.3.5.8788 - Information Disclosure
# Date: 5/31/2023
# Exploit Author: Victor A. Morales, GM Sectec Inc.
# Vendor Homepage: https://www.mcl-mobilityplatform.com/net.php
# Version: 4.3.5.8788 (other versions may be affected)
# Tested on: Microsoft Windows 10 Pro
# CVE: CVE-2023-34834

Description:
Directory browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the "/file" endpoint.

Steps to reproduce:
1. Navigate to the webserver on default port 5080, where "Index of Services" will disclose directories, including the "/file" directory. 
2. Browse to the "/file" directory and database entry folders configured
3. The "AdoInfo.txt" file will contain the database connection strings in plaintext for the configured database. Other files containing database information are also available inside the directory.


MCL-Net 4.3.5.8788: A Critical Information Disclosure Vulnerability Exposed

On May 31, 2023, cybersecurity researcher Victor A. Morales of GM Sectec Inc. disclosed a severe information disclosure vulnerability in MCL-Net version 4.3.5.8788, assigned the CVE identifier CVE-2023-34834. This flaw affects the webserver component of the MCL Mobility Platform, exposing sensitive system data through a seemingly innocuous directory browsing feature.

Understanding the Vulnerability

At its core, the vulnerability stems from improper access controls within the webserver’s directory listing functionality. By default, MCL-Net runs on port 5080 and enables directory browsing, allowing unauthenticated users to view the filesystem structure via the web interface.

When a user navigates to http://[target-ip]:5080, they are presented with an Index of Services page that lists available directories. Among these is the /file endpoint, which contains configuration files related to database connections.

Exploitation Path: From Directory Browsing to Data Exposure

Attackers can exploit this vulnerability through a simple, three-step process:

  • Access the MCL-Net webserver at http://[target-ip]:5080.
  • Navigate to the /file directory.
  • Inspect subdirectories corresponding to configured databases.

Inside these folders, attackers discover files such as AdoInfo.txt, which contain plaintext database connection strings—including usernames, passwords, hostnames, and port numbers.

Example of Exposed Data


Server=192.168.1.100;Port=3306;Database=security_db;User=admin;Password=SecurePass123!

This example illustrates the type of information exposed by the vulnerability. The database credentials are stored in plain text, making them easily exploitable for lateral movement, data theft, or remote database manipulation.

Additional Risk Factors

Beyond AdoInfo.txt, other files in the /file directory may contain:

  • Configuration logs
  • Authentication token storage
  • API key files
  • Network topology details

These additional artifacts can enable attackers to map internal systems, identify service dependencies, and plan further exploitation.

Why This Is a High-Risk Vulnerability

Information disclosure may seem less severe than, say, remote code execution, but in practice, it is a critical stepping stone in many attack chains. With access to database credentials, an attacker can:

  • Connect directly to the backend database using tools like MySQL Workbench or SQL injection payloads.
  • Exfiltrate sensitive data such as user credentials, financial records, or IoT device logs.
  • Modify database entries to disable security controls or inject malicious data.

Moreover, this vulnerability is unauthenticated—no login or authorization is required. This makes it ideal for reconnaissance and automated scanning.

Real-World Impact and Mitigation

Given that MCL-Net is used in industrial and transportation infrastructure (e.g., smart mobility systems), exposure of database credentials could compromise entire network operations. For instance, an attacker could:

  • Access real-time vehicle tracking data.
  • Alter traffic signal timing configurations.
  • Disable monitoring systems.

Immediate mitigation steps:

  • Disable directory browsing on the webserver.
  • Restrict access to the /file endpoint via authentication or IP whitelisting.
  • Encrypt sensitive configuration files (e.g., using a key-based cipher).
  • Implement file integrity monitoring to detect unauthorized access.

Vendor Response and Patching

As of June 2023, MCL Mobility Platform has acknowledged the issue and released a patch for version 4.3.5.8788. The update disables directory listing by default and introduces access control mechanisms for sensitive directories.

Recommended action: Users of MCL-Net should upgrade to the latest stable version and conduct a full audit of configuration files stored in accessible directories.

Security Best Practices for Webserver Configuration

Best Practice Why It Matters
Disable directory browsing Prevents attackers from mapping file structures.
Use secure file permissions Ensures only authorized users can access sensitive data.
Encrypt configuration files Protects credentials even if files are accessed.
Implement rate limiting and logging Helps detect and respond to suspicious access patterns.

Proactive security measures are essential in preventing information disclosure vulnerabilities from becoming entry points for larger breaches.

Conclusion

CVE-2023-34834 serves as a stark reminder that even seemingly minor configuration flaws can lead to major security incidents. The MCL-Net 4.3.5.8788 vulnerability highlights the importance of securing default webserver behaviors, especially in critical infrastructure systems.

Security professionals must prioritize configuration hardening, access control enforcement, and continuous monitoring to mitigate risks like this. As technology evolves, so must our defensive strategies—especially when sensitive data is exposed through simple, overlooked features.