Skip to main content

CVE-2023-4122: CWE-434 Unrestricted Upload of File with Dangerous Type in Kashipara Group Student Information System

Critical
VulnerabilityCVE-2023-4122cvecve-2023-4122cwe-434
Published: Thu Dec 07 2023 (12/07/2023, 23:10:04 UTC)
Source: CVE Database V5
Vendor/Project: Kashipara Group
Product: Student Information System

Description

Student Information System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'photo' parameter of my-profile page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.

AI-Powered Analysis

AILast updated: 07/07/2025, 09:13:40 UTC

Technical Analysis

CVE-2023-4122 is a critical vulnerability identified in version 1.0 of the Kashipara Group's Student Information System (SIS). The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Specifically, the flaw exists in the 'photo' parameter on the my-profile page, where authenticated users can upload files without proper validation or restriction on file types. This insecure file upload allows an attacker with valid credentials to upload malicious files, such as web shells or scripts, that can be executed on the server. Successful exploitation leads to Remote Code Execution (RCE), granting the attacker full control over the server hosting the SIS application. The CVSS v3.1 base score is 9.9, indicating a critical severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability with a scope change. No patches are currently available, and no known exploits have been reported in the wild yet. However, the high severity and ease of exploitation by authenticated users make this a significant threat to organizations using this software.

Potential Impact

For European organizations using the Kashipara Group Student Information System v1.0, this vulnerability poses a severe risk. The ability for an authenticated user to achieve RCE can lead to complete compromise of the SIS server, exposing sensitive student data including personal identification, academic records, and possibly financial information. This breach could result in violations of GDPR due to unauthorized data access and exfiltration, leading to legal penalties and reputational damage. Furthermore, attackers could use the compromised server as a pivot point to infiltrate broader internal networks, potentially disrupting educational operations or deploying ransomware. The critical nature of the vulnerability means that even low-privileged users with access to the profile photo upload functionality can cause significant damage, increasing the attack surface within educational institutions. Given the importance of data privacy and security in the education sector, the impact extends beyond technical compromise to regulatory and operational consequences.

Mitigation Recommendations

Immediate mitigation steps include disabling the photo upload feature or restricting it to trusted administrators until a secure patch is available. Implement strict server-side validation to allow only safe image file types (e.g., JPEG, PNG) and enforce file size limits. Employ content inspection techniques such as MIME type verification and scanning uploaded files for embedded malicious code. Use a separate storage location for uploaded files outside the web root to prevent direct execution. Apply the principle of least privilege to the web server process to limit the impact of potential RCE. Monitor logs for suspicious upload activity and anomalous behavior indicative of exploitation attempts. Organizations should also conduct a thorough audit of user privileges to ensure only necessary users have access to the profile update functionality. Finally, maintain regular backups and have an incident response plan ready to quickly contain and remediate any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2023-08-02T21:52:40.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68371692182aa0cae24f0c46

Added to database: 5/28/2025, 1:58:42 PM

Last enriched: 7/7/2025, 9:13:40 AM

Last updated: 8/11/2025, 8:08:20 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats