CVE-2023-44008

9.8 CRITICAL

📋 TL;DR

A file upload vulnerability in mojoPortal v2.7.0.0 allows remote attackers to upload malicious files through the File Manager function, potentially leading to arbitrary code execution. This affects all systems running the vulnerable version of mojoPortal. Attackers can exploit this without authentication to compromise the web server.

💻 Affected Systems

Products:
  • mojoPortal
Versions: 2.7.0.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the File Manager function specifically. Any mojoPortal installation with this version is vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Webshell upload leading to server control, data exfiltration, and further network penetration.

🟢

If Mitigated

File upload blocked or sanitized, preventing malicious file execution and limiting impact to file storage only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to the vulnerable File Manager endpoint. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.0.1 or later

Vendor Advisory: https://www.mojoportal.com/

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download latest mojoPortal version from official site. 3. Replace vulnerable files with patched version. 4. Restart web server. 5. Verify File Manager functionality.

🔧 Temporary Workarounds

Disable File Manager

all

Temporarily disable the vulnerable File Manager function to prevent exploitation.

Modify web.config or appropriate configuration to restrict access to /FileManager/ paths

Web Application Firewall Rules

all

Implement WAF rules to block malicious file uploads to File Manager endpoints.

Configure WAF to block requests containing executable file extensions to /FileManager/ paths

🧯 If You Can't Patch

  • Implement strict file upload validation: allow only specific safe extensions, scan uploaded files with antivirus.
  • Network segmentation: isolate mojoPortal server, restrict inbound access to necessary IPs only.

🔍 How to Verify

Check if Vulnerable:

Check mojoPortal version in admin panel or web.config file. Version 2.7.0.0 indicates vulnerability.

Check Version:

Check Admin > Site Settings > About in mojoPortal admin interface

Verify Fix Applied:

Verify version is 2.7.0.1 or later. Test File Manager with malicious file upload attempt - should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • File upload requests to /FileManager/ with executable extensions
  • Unusual file creation in upload directories
  • Webshell access patterns

Network Indicators:

  • HTTP POST requests to File Manager endpoints with suspicious file content
  • Outbound connections from mojoPortal server to unknown IPs

SIEM Query:

source="mojoPortal" AND (uri_path="/FileManager/" AND http_method="POST") AND (file_extension="php" OR file_extension="asp" OR file_extension="aspx" OR file_extension="jsp")

🔗 References

📤 Share & Export