Plattform
php
Komponente
extplorer
Behoben in
2.1.15
CVE-2023-54335 is a critical Remote Code Execution (RCE) vulnerability discovered in eXtplorer, a PHP-based file management system. This flaw allows attackers to bypass authentication controls, effectively logging in without credentials. Successful exploitation enables the upload of malicious PHP files, granting attackers the ability to execute arbitrary commands on the server, potentially leading to complete system compromise. The vulnerability impacts versions 0.0.0 through 2.1.14, with a fix available in version 2.1.15.
The impact of CVE-2023-54335 is severe. An attacker who successfully exploits this vulnerability gains complete control over the server hosting the eXtplorer instance. This includes the ability to read, write, and execute files, install malware, steal sensitive data (database credentials, API keys, user information), and pivot to other systems on the network. The ease of authentication bypass significantly lowers the barrier to entry for attackers, making this a high-priority target. The ability to upload and execute PHP code directly on the server mirrors the impact of other critical web application vulnerabilities, allowing for persistent backdoors and long-term compromise. A successful attack could result in data breaches, denial of service, and reputational damage.
CVE-2023-54335 was publicly disclosed on 2026-01-13. The vulnerability's ease of exploitation and the potential for significant impact suggest a medium probability of exploitation. While no public proof-of-concept (PoC) code has been widely reported, the authentication bypass is straightforward to implement, increasing the likelihood of exploitation. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns.
Organizations and individuals using eXtplorer for file management, particularly those hosting the application on shared hosting environments or with limited security controls, are at significant risk. Legacy eXtplorer installations that have not been regularly updated are especially vulnerable. Any system where eXtplorer is used to store sensitive data, such as user credentials or financial information, is a high-priority target.
• php: Examine eXtplorer configuration files for unusual permissions or modifications.
find /var/www/html/extplorer -type f -perm +011 -print• php: Monitor web server access logs for suspicious login attempts or file uploads. Look for requests bypassing authentication.
grep -i 'login.php' /var/log/apache2/access.log | grep -v '200 OK'• generic web: Check for newly uploaded PHP files in the eXtplorer directory with unusual names or content.
find /var/www/html/extplorer -name '*.php' -printdisclosure
Exploit-Status
EPSS
0.43% (62% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2023-54335 is to immediately upgrade eXtplorer to version 2.1.15 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restrict file upload permissions within eXtplorer to prevent the execution of PHP files. Implement a Web Application Firewall (WAF) with rules to detect and block suspicious login attempts and file uploads. Carefully review eXtplorer's configuration to ensure it adheres to security best practices, including disabling unnecessary features and limiting user privileges. After upgrading, verify the fix by attempting a login without credentials; the login attempt should be rejected.
Aktualisieren Sie eXtplorer auf Version 2.1.15 oder höher, um die Authentifizierungs-Bypass- und Remote-Code-Ausführungs-Schwachstelle zu beheben. Stellen Sie sicher, dass Sie alle bösartigen Dateien entfernen, die möglicherweise vor der Aktualisierung hochgeladen wurden. Überprüfen Sie die Serverprotokolle auf verdächtige Aktivitäten.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2023-54335 is a critical RCE vulnerability in eXtplorer, allowing attackers to bypass authentication and execute commands on the server.
You are affected if you are using eXtplorer versions 0.0.0 through 2.1.14. Upgrade to 2.1.15 to mitigate the risk.
Upgrade eXtplorer to version 2.1.15. As a temporary workaround, restrict file upload permissions and implement a WAF.
While no widespread exploitation has been confirmed, the vulnerability's ease of exploitation suggests a medium probability of exploitation.
Refer to the eXtplorer project's website or security mailing list for the official advisory regarding CVE-2023-54335.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.