CVE-2023-7335

N/A Unknown

📋 TL;DR

EduSoho versions before 22.4.7 contain an unauthenticated path traversal vulnerability in the classroom-course-statistics export feature. Attackers can read arbitrary files from the server filesystem, potentially exposing sensitive configuration files containing secrets and database credentials. All EduSoho deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • EduSoho
Versions: All versions prior to 22.4.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default classroom-course-statistics export functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via credential theft from configuration files, leading to database access, privilege escalation, and lateral movement.

🟠

Likely Case

Exposure of sensitive configuration files (database credentials, API keys, secrets) leading to data breaches and unauthorized access.

🟢

If Mitigated

Limited information disclosure if proper file permissions and network segmentation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Shadowserver Foundation observed exploitation in the wild on 2026-01-19. Multiple public proof-of-concept exploits available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.4.7

Vendor Advisory: https://github.com/edusoho/edusoho/releases/tag/v22.4.7

Restart Required: Yes

Instructions:

1. Backup your current installation and database. 2. Download EduSoho version 22.4.7 or later from official repository. 3. Replace vulnerable files with patched version. 4. Restart web server and application services. 5. Verify functionality.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block path traversal sequences in fileNames[] parameter

Add WAF rule to block requests containing '../' or '..\' in fileNames[] parameter

Access Control Restriction

all

Restrict access to classroom-course-statistics endpoint

Add IP-based restriction or authentication requirement to affected endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EduSoho server from sensitive systems
  • Rotate all database credentials, API keys, and secrets stored in configuration files

🔍 How to Verify

Check if Vulnerable:

Test if classroom-course-statistics endpoint accepts path traversal sequences in fileNames[] parameter

Check Version:

Check EduSoho version in admin panel or application configuration

Verify Fix Applied:

Verify that path traversal attempts are rejected and version shows 22.4.7 or higher

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to classroom-course-statistics with fileNames[] containing '../' or '..\'
  • Unusual file access patterns from web application

Network Indicators:

  • Multiple requests to config/parameters.yml or other sensitive files

SIEM Query:

web.url:*classroom-course-statistics* AND (web.param.fileNames:*../* OR web.param.fileNames:*..\*)

🔗 References

📤 Share & Export