CVE-2023-41566

8.1 HIGH

📋 TL;DR

CVE-2023-41566 is an arbitrary file download vulnerability in OA EKP v16 that allows attackers to download sensitive files including administrator passwords via the /ui/sys_ui_extend/sysUiExtend.do endpoint. This affects organizations using Landray OA EKP v16 software. Successful exploitation can lead to complete system compromise.

💻 Affected Systems

Products:
  • Landray OA EKP
Versions: v16
Operating Systems: All platforms running OA EKP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of OA EKP v16.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrator credentials, gain database access, exfiltrate sensitive data, and achieve persistent control over the entire system.

🟠

Likely Case

Attackers download configuration files containing credentials, gain administrative access to the OA system, and potentially access connected databases.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the OA application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates exploitation via simple HTTP requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Contact Landray for security updates or upgrade to a newer version if available.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Block access to the /ui/sys_ui_extend/sysUiExtend.do endpoint using web application firewall or reverse proxy rules.

# Example nginx location block:
location /ui/sys_ui_extend/sysUiExtend.do { deny all; }
# Example Apache .htaccess:
<Files "sysUiExtend.do">
Order Allow,Deny
Deny from all
</Files>

Network Access Control

linux

Restrict access to the OA EKP application to trusted IP addresses only.

# Example iptables rule:
iptables -A INPUT -p tcp --dport [OA_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [OA_PORT] -j DROP

🧯 If You Can't Patch

  • Isolate the OA EKP server in a separate network segment with strict firewall rules
  • Implement multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/ui/sys_ui_extend/sysUiExtend.do?method=download&fileName=../../WEB-INF/classes/jdbc.properties and check if it returns database configuration.

Check Version:

Check the OA EKP version in the web interface or configuration files. The exact command depends on installation method.

Verify Fix Applied:

Verify the vulnerable endpoint returns 403 Forbidden or is inaccessible after applying workarounds.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /ui/sys_ui_extend/sysUiExtend.do with download parameter
  • Access to sensitive files like jdbc.properties from web requests
  • Unusual file download patterns from the OA application

Network Indicators:

  • HTTP GET requests with path traversal sequences (../../) to the vulnerable endpoint
  • Downloads of configuration files from the OA server

SIEM Query:

source="oa_web_logs" AND uri="/ui/sys_ui_extend/sysUiExtend.do" AND (query="*download*" OR query="*fileName=*" OR query="*../*")

🔗 References

📤 Share & Export