CVE-2023-5524

8.2 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on M-Files Web Companion servers by uploading specially crafted files. It affects all organizations running vulnerable versions of M-Files Web Companion, potentially compromising sensitive document management systems.

💻 Affected Systems

Products:
  • M-Files Web Companion
Versions: All versions before 23.10 and LTS versions before 23.8 LTS SR1
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of Web Companion. The vulnerability is in the file upload handling component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive documents, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Data exfiltration, ransomware deployment, or unauthorized access to confidential business documents stored in M-Files.

🟢

If Mitigated

Limited impact with proper network segmentation and file upload restrictions, though still potentially serious if exploited.

🌐 Internet-Facing: HIGH - Web Companion is typically internet-facing, allowing direct exploitation from external attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to the Web Companion interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CWE-434 and CVSS score, exploitation likely requires only file upload capability without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.10 or 23.8 LTS SR1

Vendor Advisory: https://product.m-files.com/security-advisories/cve-2023-5524/

Restart Required: Yes

Instructions:

1. Download latest version from M-Files customer portal. 2. Backup current configuration. 3. Run installer with administrative privileges. 4. Restart Web Companion service. 5. Verify version in Web Companion admin interface.

🔧 Temporary Workarounds

Restrict File Upload Types

windows

Configure Web Companion to reject all file types except explicitly allowed business documents

Configure via M-Files Admin > Web Companion Settings > File Upload Restrictions

Network Segmentation

all

Place Web Companion behind WAF with file upload inspection and restrict external access

🧯 If You Can't Patch

  • Implement strict network access controls to limit Web Companion exposure to trusted IPs only
  • Deploy web application firewall with file upload inspection and malicious file detection

🔍 How to Verify

Check if Vulnerable:

Check Web Companion version in admin interface or via M-Files Server Management Console

Check Version:

Check M-Files Server Management Console > Components > Web Companion version

Verify Fix Applied:

Confirm version is 23.10 or higher, or 23.8 LTS SR1 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to Web Companion
  • Execution of unexpected processes by Web Companion service
  • Failed file upload attempts with suspicious extensions

Network Indicators:

  • HTTP POST requests with unusual file types to Web Companion endpoints
  • Outbound connections from Web Companion server to unknown external IPs

SIEM Query:

source="web_companion_logs" AND (event="file_upload" AND file_extension NOT IN ("pdf","docx","xlsx")) OR process_execution WHERE parent_process="mfwebcompanion.exe"

🔗 References

📤 Share & Export