CVE-2023-6849
📋 TL;DR
This critical Server-Side Request Forgery (SSRF) vulnerability in kodbox allows attackers to manipulate the 'path' parameter in the cover function to make unauthorized requests from the server. Attackers can potentially access internal services, exfiltrate data, or perform other malicious actions. All kodbox installations up to version 1.48 are affected.
💻 Affected Systems
- kalcaddle kodbox
📦 What is this software?
Kodbox by Kodcloud
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access internal services, exfiltrate sensitive data, perform port scanning of internal networks, or chain with other vulnerabilities to achieve remote code execution.
Likely Case
Unauthorized access to internal HTTP services, data exfiltration from internal systems, or reconnaissance of internal network infrastructure.
If Mitigated
Limited impact if network segmentation restricts internal service access and proper input validation is implemented.
🎯 Exploit Status
Exploit details are publicly disclosed, making weaponization likely. Attack requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.48.04
Vendor Advisory: https://github.com/kalcaddle/kodbox/releases/tag/1.48.04
Restart Required: No
Instructions:
1. Backup current installation. 2. Download version 1.48.04 from official repository. 3. Replace affected files or perform complete upgrade. 4. Verify patch commit 63a4d5708d210f119c24afd941d01a943e25334c is applied.
🔧 Temporary Workarounds
Disable fileThumb Plugin
allTemporarily disable the vulnerable plugin to prevent exploitation
mv plugins/fileThumb plugins/fileThumb.disabled
Restart web server if required
Network Segmentation
allRestrict kodbox server's outbound network access to prevent SSRF exploitation
Configure firewall rules to block outbound HTTP/HTTPS from kodbox server except to required services
🧯 If You Can't Patch
- Implement strict network segmentation to isolate kodbox from internal services
- Deploy web application firewall with SSRF protection rules
🔍 How to Verify
Check if Vulnerable:
Check kodbox version: if version <= 1.48, system is vulnerable. Also check if plugins/fileThumb/app.php exists without patch commit 63a4d5708d210f119c24afd941d01a943e25334c.
Check Version:
Check kodbox version in admin panel or examine version files in installation directory
Verify Fix Applied:
Verify version is 1.48.04 or higher, and check that commit 63a4d5708d210f119c24afd941d01a943e25334c is present in the codebase.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests from server to internal IPs
- Requests to fileThumb plugin with unusual path parameters
- Multiple failed outbound connection attempts
Network Indicators:
- Outbound HTTP requests from kodbox server to internal services
- Unusual port scanning patterns originating from kodbox server
SIEM Query:
source="kodbox_logs" AND (uri CONTAINS "/plugins/fileThumb" OR user_agent CONTAINS "kodbox") AND (dst_ip IN internal_range)
🔗 References
- https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c
- https://github.com/kalcaddle/kodbox/releases/tag/1.48.04
- https://note.zhaoj.in/share/jSsPAWT1pKsq
- https://vuldb.com/?ctiid.248210
- https://vuldb.com/?id.248210
- https://github.com/kalcaddle/kodbox/commit/63a4d5708d210f119c24afd941d01a943e25334c
- https://github.com/kalcaddle/kodbox/releases/tag/1.48.04
- https://note.zhaoj.in/share/jSsPAWT1pKsq
- https://vuldb.com/?ctiid.248210
- https://vuldb.com/?id.248210