CVE-2023-36348

8.8 HIGH

📋 TL;DR

POS Codekop v2.0 contains an authenticated remote code execution vulnerability via the filename parameter. This allows authenticated attackers to upload malicious files and execute arbitrary code on the server. Organizations using POS Codekop v2.0 are affected.

💻 Affected Systems

Products:
  • POS Codekop
Versions: v2.0
Operating Systems: Any OS running POS Codekop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise, data theft, ransomware deployment, and lateral movement within the network.

🟠

Likely Case

Webshell installation leading to data exfiltration, credential harvesting, and persistence on the compromised system.

🟢

If Mitigated

Limited impact due to network segmentation, strict file upload validation, and minimal user privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code and demonstration videos are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Implement File Upload Validation

all

Restrict file uploads to specific extensions and validate file content.

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block malicious file upload attempts.

🧯 If You Can't Patch

  • Isolate the POS Codekop system from critical network segments.
  • Implement strict access controls and monitor for unusual file upload activities.

🔍 How to Verify

Check if Vulnerable:

Check if running POS Codekop v2.0 and test authenticated file upload with malicious filenames.

Check Version:

Check application configuration or documentation for version information.

Verify Fix Applied:

Test file upload functionality to ensure only allowed extensions are accepted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with executable extensions
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious filenames

SIEM Query:

source="web_logs" AND (url_path="/upload" OR filename="*.php" OR filename="*.jsp")

🔗 References

📤 Share & Export