CVE-2023-44080

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on PGYER CodeFever systems by sending a specially crafted request to the branchList component. It affects all deployments running vulnerable versions of PGYER CodeFever, potentially compromising the entire server.

💻 Affected Systems

Products:
  • PGYER CodeFever
Versions: v.2023.8.14-2ce4006 and potentially earlier versions
Operating Systems: All platforms running CodeFever
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the branchList component and affects default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands as the web server user, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Remote code execution leading to web shell installation, credential harvesting, and persistence establishment on the vulnerable server.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and least privilege principles are implemented, though exploitation remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code is available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check PGYER CodeFever repository for latest version

Vendor Advisory: https://github.com/advisories/GHSA-cjp8-pj2w-v99h

Restart Required: Yes

Instructions:

1. Update to the latest version of PGYER CodeFever. 2. Restart the CodeFever service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to the CodeFever instance to trusted IP addresses only

# Use firewall rules to restrict access
iptables -A INPUT -p tcp --dport [CODEFEVER_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [CODEFEVER_PORT] -j DROP

WAF Rule Implementation

all

Implement web application firewall rules to block malicious requests to branchList endpoint

# Example ModSecurity rule
SecRule REQUEST_URI "@rx /branchList" "id:1001,phase:2,deny,msg:'CVE-2023-44080 Block'"

🧯 If You Can't Patch

  • Isolate the CodeFever instance from other critical systems using network segmentation
  • Implement strict monitoring and alerting for suspicious activity on the CodeFever server

🔍 How to Verify

Check if Vulnerable:

Check if your CodeFever version matches the vulnerable version string or earlier

Check Version:

Check CodeFever web interface or configuration files for version information

Verify Fix Applied:

Verify the version has been updated beyond v.2023.8.14-2ce4006 and test that branchList endpoint no longer accepts malicious input

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /branchList endpoint
  • Suspicious command execution patterns in web server logs
  • Unexpected process creation from web server user

Network Indicators:

  • Malformed HTTP requests targeting branchList component
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_logs" AND uri="/branchList" AND (status=500 OR method="POST" AND size>1000)

🔗 References

📤 Share & Export