CVE-2023-30856

8.3 HIGH

📋 TL;DR

CVE-2023-30856 is a cross-site WebSocket hijacking vulnerability in eDEX-UI terminal emulator versions 2.2.8 and earlier. When users run eDEX-UI while browsing the web, malicious websites can connect to the terminal's internal WebSocket and execute arbitrary shell commands. This affects all users of vulnerable eDEX-UI versions who browse the web while the application is running.

💻 Affected Systems

Products:
  • eDEX-UI
Versions: 2.2.8 and earlier
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable when WebSocket server is enabled (default behavior).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via arbitrary command execution with the privileges of the eDEX-UI process, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malicious websites executing commands to steal sensitive data, install malware, or pivot to other systems on the network.

🟢

If Mitigated

Limited impact if eDEX-UI runs with minimal privileges and users avoid browsing untrusted sites while it's active.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit malicious website while eDEX-UI is running. No authentication needed to connect to WebSocket.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/GitSquared/edex-ui/security/advisories/GHSA-q8xc-f2wf-ffh9

Restart Required: No

Instructions:

No official patch available. Project archived since 2021 with no plans for updates.

🔧 Temporary Workarounds

Disable eDEX-UI while browsing

all

Completely shut down eDEX-UI before browsing the web or visiting untrusted sites.

Run with minimal privileges

all

Configure eDEX-UI to run with lowest possible user privileges to limit potential damage.

sudo -u nobody edex-ui
runas /user:guest edex-ui.exe

🧯 If You Can't Patch

  • Discontinue use of eDEX-UI and switch to alternative terminal emulators
  • Use browser extensions to block WebSocket connections from untrusted sites

🔍 How to Verify

Check if Vulnerable:

Check eDEX-UI version. If version is 2.2.8 or earlier, you are vulnerable.

Check Version:

Check About section in eDEX-UI or examine package metadata

Verify Fix Applied:

No fix available to verify. Only workarounds can be implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WebSocket connections to eDEX-UI port
  • Unusual command execution in terminal logs

Network Indicators:

  • WebSocket traffic from browser processes to eDEX-UI port
  • Cross-origin WebSocket requests

SIEM Query:

websocket AND (destination_port:port_number OR process_name:edex-ui)

🔗 References

📤 Share & Export