CVE-2022-23317 Overview
CVE-2022-23317 is an information disclosure vulnerability affecting Cobalt Strike versions 4.5 and earlier. The vulnerability exists in the HTTP(S) listener component, which fails to properly validate whether request URLs begin with a forward slash ("/"). This improper authentication mechanism allows remote attackers to obtain sensitive information by crafting specially formatted URL requests to the Cobalt Strike listener.
Critical Impact
Remote unauthenticated attackers can extract sensitive information from Cobalt Strike team servers, potentially exposing infrastructure details, beacon configurations, or other operational data used in red team engagements.
Affected Products
- HelpSystems Cobalt Strike versions 4.5 and earlier
- Cobalt Strike HTTP listener configurations
- Cobalt Strike HTTPS listener configurations
Discovery Timeline
- 2022-02-15 - CVE-2022-23317 published to NVD
- 2024-11-21 - Last updated in NVD database
Technical Details for CVE-2022-23317
Vulnerability Analysis
This vulnerability stems from improper authentication (CWE-287) in the Cobalt Strike HTTP(S) listener component. The listener fails to enforce proper URL path validation, specifically not checking whether incoming request URLs begin with a forward slash character. This oversight allows attackers to bypass intended access controls and retrieve information that should be restricted.
The attack can be performed remotely over the network without requiring any user interaction or prior authentication. Successful exploitation results in unauthorized access to sensitive information, though it does not impact the integrity or availability of the affected system.
Root Cause
The root cause of CVE-2022-23317 lies in insufficient input validation within the HTTP(S) listener's URL parsing logic. The listener component processes incoming HTTP requests without properly validating the URL path format. By not enforcing that URLs must begin with the expected "/" prefix, the listener inadvertently exposes an alternative access path that bypasses normal request handling and authentication checks.
Attack Vector
The attack is network-based and requires no special privileges or user interaction. An attacker can exploit this vulnerability by sending crafted HTTP or HTTPS requests to a Cobalt Strike team server with a listener configured. By specifying URLs that do not begin with the expected forward slash, attackers can manipulate the request handling logic to obtain information about the Cobalt Strike infrastructure.
The vulnerability enables passive reconnaissance against Cobalt Strike deployments. Attackers may be able to identify active team servers, gather configuration details, or fingerprint Cobalt Strike installations. This information could be leveraged to detect red team operations or to target Cobalt Strike infrastructure for further attacks.
For detailed technical analysis of Cobalt Strike stager mechanics, refer to the Donghuangt1 Stager Analysis.
Detection Methods for CVE-2022-23317
Indicators of Compromise
- HTTP/HTTPS requests to Cobalt Strike listeners with malformed URL paths that do not begin with "/"
- Unusual access patterns against team server listener ports from unexpected IP addresses
- Increased reconnaissance activity targeting known Cobalt Strike listener ports
Detection Strategies
- Monitor HTTP access logs for requests with non-standard URL path formats
- Implement network intrusion detection rules to identify Cobalt Strike listener fingerprinting attempts
- Deploy web application firewall rules to block requests with malformed URL structures
- Correlate access logs with threat intelligence feeds for known scanning infrastructure
Monitoring Recommendations
- Enable verbose logging on Cobalt Strike team servers to capture all incoming requests
- Implement alerting for repeated failed or unusual requests to listener endpoints
- Monitor for external scanning activity targeting listener ports from threat intelligence sources
- Review team server logs regularly for indicators of reconnaissance activity
How to Mitigate CVE-2022-23317
Immediate Actions Required
- Upgrade Cobalt Strike to a version newer than 4.5 that addresses this vulnerability
- Restrict network access to Cobalt Strike team server listeners using firewall rules
- Implement IP allowlisting to limit access to known operator IP addresses
- Consider deploying listeners behind a reverse proxy with additional access controls
Patch Information
HelpSystems has addressed this vulnerability in versions of Cobalt Strike released after version 4.5. Organizations using Cobalt Strike for legitimate red team operations should upgrade to the latest available version to remediate this vulnerability. Contact HelpSystems support for specific patch and upgrade guidance.
Workarounds
- Implement strict firewall rules to limit listener access to known red team operator IP addresses
- Deploy Cobalt Strike listeners behind a reverse proxy with additional authentication layers
- Use VPN or other network segmentation to restrict access to team server infrastructure
- Monitor listener traffic for signs of unauthorized access or reconnaissance attempts
# Example firewall configuration to restrict listener access
# Allow only known operator IP addresses to reach the Cobalt Strike listener
iptables -A INPUT -p tcp --dport 443 -s <OPERATOR_IP_1> -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s <OPERATOR_IP_2> -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


