Skip to main content

CVE-2023-39691: n/a in n/a

Critical
VulnerabilityCVE-2023-39691cvecve-2023-39691
Published: Tue Jan 16 2024 (01/16/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue discovered in kodbox through 1.43 allows attackers to arbitrarily add Administrator accounts via crafted GET request.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:26:31 UTC

Technical Analysis

CVE-2023-39691 is a critical security vulnerability affecting kodbox versions up to 1.43. The vulnerability allows an unauthenticated attacker to add arbitrary Administrator accounts by sending a specially crafted GET request. This means that an attacker does not need any prior authentication or user interaction to exploit this flaw, making it highly dangerous. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized administrative access can lead to full system compromise, data theft, data manipulation, or service disruption. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Kodbox is a web-based file management system often used for managing files on web servers, which means this vulnerability could be exploited remotely over the internet if the affected kodbox instance is exposed. The lack of vendor or product details in the report limits precise identification of the affected deployment scenarios, but the key risk remains the ability to create administrator accounts without authorization, effectively giving attackers full control over the affected system.

Potential Impact

For European organizations, the impact of this vulnerability could be severe, especially for those using kodbox as part of their web infrastructure or file management solutions. Unauthorized administrative access could lead to data breaches involving sensitive personal data protected under GDPR, resulting in legal and financial penalties. The integrity of critical business data and operational continuity could be compromised, leading to reputational damage and potential operational downtime. Organizations in sectors such as government, finance, healthcare, and critical infrastructure, where file management systems are integral, could face heightened risks. Additionally, the ease of exploitation and lack of authentication requirements mean that attackers could rapidly compromise vulnerable systems, potentially using them as footholds for further lateral movement within networks or for launching ransomware attacks. The absence of known exploits in the wild currently provides a limited window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

Given the critical severity and ease of exploitation, European organizations should immediately audit their environments to identify any deployments of kodbox, particularly versions up to 1.43. If kodbox is in use, organizations should seek vendor advisories or community patches addressing CVE-2023-39691 and apply them without delay. In the absence of official patches, organizations should consider temporarily disabling external access to kodbox instances or restricting access via network-level controls such as firewalls or VPNs to trusted users only. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious GET requests targeting administrator account creation endpoints can provide interim protection. Monitoring web server logs for unusual GET requests or sudden creation of new administrator accounts is critical for early detection. Organizations should also review and harden authentication and authorization configurations, and ensure that administrative access is logged and alerts are configured for anomalous activities. Finally, organizations should prepare incident response plans specific to web application compromises to rapidly contain and remediate any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-08-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a04ee

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:26:31 PM

Last updated: 8/12/2025, 5:16:38 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats