CVE-2023-1734
📋 TL;DR
This critical vulnerability in SourceCodester Young Entrepreneur E-Negosyo System 1.0 allows remote attackers to upload arbitrary files via the image parameter in the admin/products/controller.php?action=add endpoint. This unrestricted file upload can lead to remote code execution or system compromise. All users running the vulnerable version are affected.
💻 Affected Systems
- SourceCodester Young Entrepreneur E-Negosyo System
📦 What is this software?
Young Entrepreneur E Negosyo System by Young Entrepreneur E Negosyo System Project
View all CVEs affecting Young Entrepreneur E Negosyo System →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system takeover, data exfiltration, or ransomware deployment
Likely Case
Webshell upload enabling persistent backdoor access, data manipulation, or lateral movement
If Mitigated
File upload attempts blocked or logged with no successful exploitation
🎯 Exploit Status
Simple HTTP POST request with malicious file upload to vulnerable endpoint
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock requests to vulnerable endpoint or restrict file uploads
WAF specific - block POST to /admin/products/controller.php?action=add with file uploads
File Upload Restriction
linuxImplement server-side file type validation and size limits
PHP: Add file extension validation and MIME type checking in upload handler
🧯 If You Can't Patch
- Disable the vulnerable endpoint via .htaccess or web server configuration
- Implement strict file upload validation including extension filtering and content checking
🔍 How to Verify
Check if Vulnerable:
Test if you can upload non-image files (like .php, .exe) to /admin/products/controller.php?action=add endpoint
Check Version:
Check system documentation or admin panel for version information
Verify Fix Applied:
Verify file upload restrictions prevent non-image file types and validate file content
📡 Detection & Monitoring
Log Indicators:
- Multiple file upload attempts to vulnerable endpoint
- Uploads of suspicious file types (.php, .exe, .jsp)
Network Indicators:
- HTTP POST requests to /admin/products/controller.php?action=add with file uploads
- Unusual outbound connections after file upload
SIEM Query:
source="web_server" AND uri="/admin/products/controller.php?action=add" AND method="POST" AND file_upload="true"