CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Default Accounts in Smartbi Could Lead to RCE

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Overview

Smartbi is a popular business intelligence (BI) platform that integrates data analysis, reporting, and visualization.

Recently, a login bypass vulnerability was disclosed, patched, and confirmed to still affect a significant number of exposed systems online.

The flaw could allow attackers to leverage built-in accounts, gain authentication tokens, and ultimately call backend APIs β€” potentially leading to sensitive data leaks or even remote code execution (RCE).


Vulnerability Details

During installation, Smartbi creates several default accounts.

By abusing specific endpoints, attackers can bypass authentication and directly obtain identity credentials. These credentials can then be reused to access backend APIs without proper login.

Impact:

  • Unauthorized access to sensitive data
  • Full backend API exposure
  • Potential for arbitrary code execution

Affected Versions:

Smartbi V7 – V10


Detection Tools

Two non-intrusive scanners are available for defenders:

1. X-POC Remote Scanner

Quick check if your target URL is vulnerable:

xpoc -r 105 -t http://target-url
Enter fullscreen mode Exit fullscreen mode


2. CloudWalker Local Scanner

Run a harmless local scan:

smartbi_internal_user_login_bypass_scanner_windows_amd64.exe scan --output result.json
Enter fullscreen mode Exit fullscreen mode


Mitigation & Fix

Temporary Workaround

  • Remove default accounts (public, service, system) if not required.
  • Do not expose Smartbi directly to the internet unless absolutely necessary.

Permanent Fix

Smartbi has released official security patches.
Supports both online upgrades and offline patch installation.
πŸ‘‰ Download patches here


Product Support

  • YunTu: Fingerprint-based detection + PoC support
  • SafeLine WAF: Virtual patch released, capable of detecting exploit attempts
  • DongJian: Custom PoC supported and published
  • CloudWalker: Platform v23.05.001+ supports detection via emergency vuln intelligence package (EMERVULN-23.06.009)
  • QuanXi: Rule updates released for exploit detection

Timeline

  • June 15 β€” Vulnerability reported to Chaitin Tech
  • June 16 β€” Vulnerability analyzed and reproduced
  • June 19 β€” Public advisory published

Final Thoughts

This Smartbi login bypass vulnerability shows once again how default accounts and weak authentication logic can quickly escalate into major security risks.

If your Smartbi deployment hasn’t been patched, apply the fix immediately β€” attackers won’t hesitate to abuse this vector for data theft or even RCE.

Meanwhile, deploying SafeLine WAF provides an extra layer of defense, blocking exploit attempts in real time.


Join the SafeLine Community

Top comments (0)