CVE-2023-30330

9.8 CRITICAL

📋 TL;DR

SoftExpert Excellence Suite 2.x versions before 2.1.3 contain a Local File Inclusion vulnerability in the defaultframe_filter.php component. This allows attackers to read arbitrary files from the server, potentially leading to remote code execution. Organizations running affected versions of SoftExpert Excellence Suite are vulnerable.

💻 Affected Systems

Products:
  • SoftExpert Excellence Suite
Versions: 2.x versions before 2.1.3
Operating Systems: Any OS running the SoftExpert Excellence Suite
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Sensitive file disclosure including configuration files, credentials, and application data, potentially enabling further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and web application firewalls in place.

🌐 Internet-Facing: HIGH - Web applications with this vulnerability exposed to the internet are highly susceptible to exploitation.
🏢 Internal Only: HIGH - Even internally facing applications are at significant risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts are available that demonstrate file inclusion and RCE capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.3

Vendor Advisory: Not publicly available in provided references

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download and install SoftExpert Excellence Suite version 2.1.3 or later. 3. Restart the application services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests to the vulnerable endpoint with pattern matching

WAF specific - configure rule to block requests containing '/se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php' with suspicious parameters

File System Restriction

linux

Restrict access to the vulnerable PHP file

chmod 000 /path/to/se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php
chown root:root /path/to/se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from critical assets
  • Deploy a web application firewall with specific rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if the file /se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php exists and test with controlled LFI payloads in a safe environment

Check Version:

Check application configuration files or admin interface for version information

Verify Fix Applied:

Verify the application version is 2.1.3 or later and test that file inclusion attempts are properly blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php with file path parameters
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP requests containing '../' sequences or file path traversal patterns
  • Unusual outbound connections from web server following exploitation

SIEM Query:

source="web_server_logs" AND uri="/se/v42300/generic/gn_defaultframe/2.0/defaultframe_filter.php" AND (param="*../*" OR param="*file=*")

🔗 References

📤 Share & Export