CVE-2023-42404

4.9 MEDIUM

📋 TL;DR

This vulnerability in OneVision Workspace allows attackers to execute arbitrary Java Expression Language (EL) code, potentially leading to remote code execution. It affects OneVision Workspace installations before WS23.1 SR1 (build w31.040). Organizations using vulnerable versions should prioritize patching.

💻 Affected Systems

Products:
  • OneVision Workspace
Versions: All versions before WS23.1 SR1 (build w31.040)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable until patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, data theft, or complete system takeover.

🟠

Likely Case

Limited code execution within application context, potentially leading to data exposure or privilege escalation.

🟢

If Mitigated

Minimal impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can directly exploit without internal access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CWE-94 indicates code injection vulnerability, but specific exploit details not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WS23.1 SR1 (build w31.040) or later

Vendor Advisory: https://www.onevision.com/

Restart Required: Yes

Instructions:

1. Download WS23.1 SR1 or later from OneVision support portal. 2. Backup current installation. 3. Apply update following vendor documentation. 4. Restart OneVision Workspace services.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to OneVision Workspace to trusted IPs only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port port="APP_PORT" protocol="tcp" accept'
firewall-cmd --reload

Application Firewall Rules

all

Implement WAF rules to block Java EL injection patterns

WAF configuration depends on specific product - configure rules to detect ${...} patterns and Java EL expressions

🧯 If You Can't Patch

  • Implement strict network segmentation and access controls
  • Deploy web application firewall with Java EL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check OneVision Workspace version in admin console or configuration files. If version is earlier than WS23.1 SR1 (build w31.040), system is vulnerable.

Check Version:

Check application.properties or admin console for version information

Verify Fix Applied:

Verify version shows WS23.1 SR1 (build w31.040) or later in admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java EL expressions in request logs
  • Unexpected process execution from OneVision Workspace
  • Error logs containing EL parsing exceptions

Network Indicators:

  • HTTP requests containing ${...} patterns to OneVision endpoints
  • Unusual outbound connections from OneVision server

SIEM Query:

source="onevision_logs" AND ("${*" OR "#{*" OR "ELException")

🔗 References

📤 Share & Export