CVE-2023-24317

8.1 HIGH

📋 TL;DR

Judging Management System 1.0 contains an arbitrary file upload vulnerability in edit_organizer.php that allows attackers to upload malicious files, potentially leading to remote code execution. This affects all installations of version 1.0. Attackers can exploit this to take control of affected systems.

💻 Affected Systems

Products:
  • Judging Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations. Requires PHP environment with file upload functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell upload leading to server compromise, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if file uploads are restricted and web application firewall blocks malicious payloads.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Packet Storm Security. Simple HTTP POST request with malicious file upload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Restrict file upload extensions

all

Modify edit_organizer.php to only allow specific safe file extensions

Edit edit_organizer.php to add: $allowed_extensions = array('jpg', 'png', 'pdf');

Implement file type verification

all

Add server-side validation to check actual file type, not just extension

Add mime-type checking: if (!in_array($_FILES['file']['type'], $allowed_mimes)) { die('Invalid file type'); }

🧯 If You Can't Patch

  • Disable edit_organizer.php functionality completely
  • Implement web application firewall rules to block file uploads to vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a test file with .php extension to /edit_organizer.php endpoint

Check Version:

Check system version in admin panel or readme files

Verify Fix Applied:

Verify uploaded PHP files cannot be executed and only allowed extensions are accepted

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to edit_organizer.php with file uploads
  • Unusual file creations in upload directories
  • Execution of uploaded .php files

Network Indicators:

  • File uploads to edit_organizer.php endpoint
  • POST requests with multipart/form-data containing executable files

SIEM Query:

source="web_logs" AND uri="/edit_organizer.php" AND method="POST" AND file_extension IN ("php", "exe", "sh")

🔗 References

📤 Share & Export