CVE-2023-36347

7.5 HIGH

📋 TL;DR

CVE-2023-36347 is an authentication bypass vulnerability in POS Codekop v2.0 that allows unauthenticated attackers to access sensitive selling data through the excel.php endpoint. This affects all organizations using the vulnerable version of POS Codekop software. Attackers can download confidential business data without any credentials.

💻 Affected Systems

Products:
  • POS Codekop
Versions: v2.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of POS Codekop v2.0 regardless of configuration. The excel.php endpoint is typically accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all sales data including customer information, transaction records, and financial data, potentially leading to data theft, regulatory fines, and business disruption.

🟠

Likely Case

Unauthorized access to sales data leading to information disclosure, potential data exfiltration, and privacy violations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated access, making internet-facing instances particularly vulnerable to automated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this to access sensitive sales data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to the vulnerable endpoint. Public proof-of-concept demonstrates simple curl commands to access data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check for official updates from POS Codekop developers. 2. If no patch available, implement workarounds. 3. Consider migrating to alternative POS software if security updates are not provided.

🔧 Temporary Workarounds

Block excel.php endpoint

all

Restrict access to the vulnerable excel.php endpoint using web server configuration or firewall rules.

# Apache: <Location /excel.php> Require all denied </Location>
# Nginx: location ~ /excel\.php$ { deny all; }

Implement authentication middleware

all

Add authentication checks before processing requests to excel.php endpoint.

# Add to excel.php: if(!isset($_SESSION['authenticated']) || $_SESSION['authenticated'] !== true) { header('HTTP/1.0 403 Forbidden'); exit; }

🧯 If You Can't Patch

  • Implement network segmentation to isolate POS Codekop system from untrusted networks
  • Deploy web application firewall (WAF) with rules to block unauthorized access to excel.php

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[pos-system-url]/excel.php without authentication. If it returns sales data without login, the system is vulnerable.

Check Version:

Check the software version in admin panel or look for version information in source code files.

Verify Fix Applied:

After implementing fixes, verify that accessing excel.php without proper authentication returns 403 Forbidden or redirects to login.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /excel.php endpoint
  • Multiple failed authentication attempts followed by excel.php access
  • Unusual download patterns from excel.php

Network Indicators:

  • HTTP GET requests to /excel.php without authentication headers
  • Unusual data exfiltration patterns from POS system

SIEM Query:

source="web_server_logs" AND (url_path="/excel.php" AND NOT (user_agent="browser" OR auth_status="success"))

🔗 References

📤 Share & Export