CVE-2023-53924

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to upload malicious PHP files disguised as avatar images in UliCMS, leading to remote code execution. Attackers can execute arbitrary system commands by accessing the uploaded file. All UliCMS 2023.1-sniffing-vicuna installations with authenticated user access are affected.

💻 Affected Systems

Products:
  • UliCMS
Versions: 2023.1-sniffing-vicuna
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit the avatar upload functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attackers to execute arbitrary commands, steal data, install backdoors, pivot to other systems, or deploy ransomware.

🟠

Likely Case

Attackers gain shell access to the web server, allowing them to read/write files, access databases, and potentially compromise the underlying operating system.

🟢

If Mitigated

With proper file upload restrictions and web application firewalls, the attack would be blocked at the upload stage or execution would be prevented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated user credentials but is straightforward to execute once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.2 or later

Vendor Advisory: https://en.ulicms.de/

Restart Required: No

Instructions:

1. Update UliCMS to version 2023.2 or later. 2. Apply the patch that restricts file upload extensions. 3. Verify the fix by testing avatar upload functionality.

🔧 Temporary Workarounds

Restrict .phar file uploads

all

Configure web server or application to block .phar file uploads at the avatar upload endpoint.

# In .htaccess for Apache: 
<FilesMatch "\.phar$">
    Order Allow,Deny
    Deny from all
</FilesMatch>
# In nginx config:
location ~ \.phar$ {
    deny all;
}

Disable avatar upload functionality

all

Temporarily disable user avatar uploads until patching is complete.

# Modify UliCMS configuration or code to disable avatar uploads

🧯 If You Can't Patch

  • Implement strict file upload validation that only allows image extensions (jpg, png, gif) and validates file content.
  • Use a web application firewall (WAF) to block requests containing .phar extensions or suspicious upload patterns.

🔍 How to Verify

Check if Vulnerable:

Check if UliCMS version is 2023.1-sniffing-vicuna and test if .phar files can be uploaded via the avatar upload feature.

Check Version:

Check UliCMS admin panel or version file, or run: grep -r 'version' /path/to/ulicms/ | grep '2023'

Verify Fix Applied:

After updating, attempt to upload a .phar file via avatar upload - it should be rejected. Verify version is 2023.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual .phar file uploads in web server logs
  • Multiple failed upload attempts followed by successful .phar upload
  • POST requests to avatar upload endpoint with .phar files

Network Indicators:

  • HTTP POST requests with .phar file uploads to avatar endpoints
  • Subsequent requests to uploaded .phar files

SIEM Query:

source="web_server" AND (uri="*avatar*" AND file_extension=".phar") OR (uri="*.phar" AND referer="*avatar*")

🔗 References

📤 Share & Export