CVE-2023-54335

9.8 CRITICAL

📋 TL;DR

eXtplorer 2.1.14 contains an authentication bypass vulnerability that allows attackers to login without valid credentials by manipulating login requests. This enables attackers to upload malicious PHP files and execute arbitrary commands on the vulnerable file management system. Organizations using eXtplorer 2.1.14 for web-based file management are affected.

💻 Affected Systems

Products:
  • eXtplorer
Versions: 2.1.14
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 2.1.14 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, data theft, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized file upload leading to web shell deployment and subsequent command execution on the web server.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and file upload restrictions.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable without authentication.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Exploit-DB (ID 51067) with simple HTTP request manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.15 or later

Vendor Advisory: https://extplorer.net/

Restart Required: No

Instructions:

1. Download latest version from extplorer.net 2. Backup current installation 3. Replace files with patched version 4. Verify authentication works correctly

🔧 Temporary Workarounds

Disable eXtplorer

linux

Temporarily disable the eXtplorer application until patching is complete.

mv /path/to/extplorer /path/to/extplorer.disabled

Restrict Access

linux

Use firewall rules to restrict access to eXtplorer only from trusted IP addresses.

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate eXtplorer from critical systems
  • Deploy web application firewall with authentication bypass detection rules

🔍 How to Verify

Check if Vulnerable:

Check version in includes/header.php or try authentication bypass with modified login request.

Check Version:

grep '\$version' /path/to/extplorer/includes/header.php

Verify Fix Applied:

Attempt authentication bypass with modified login request - should fail with proper authentication required.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login patterns
  • Successful logins without password validation
  • PHP file uploads to upload directory

Network Indicators:

  • HTTP POST requests to login.php with manipulated parameters
  • Unexpected file uploads to eXtplorer

SIEM Query:

source="web.log" (uri="/login.php" AND method="POST" AND (param_contains("password","") OR param_missing("password")))

🔗 References

📤 Share & Export