Skip to main content

CVE-2023-50982: n/a in n/a

Critical
VulnerabilityCVE-2023-50982cvecve-2023-50982
Published: Mon Jan 08 2024 (01/08/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executable files, because upload_action and edit_action in Admin_SmileysController do not check the file extension. This leads to remote code execution with the privileges of the www-data user. The fixed versions are 5.3.4, 5.2.6, 5.1.7, and 5.0.9.

AI-Powered Analysis

AILast updated: 07/04/2025, 02:13:35 UTC

Technical Analysis

CVE-2023-50982 is a critical vulnerability affecting Stud.IP versions 5.x through 5.3.3. The flaw exists in the Admin_SmileysController component, specifically in the upload_action and edit_action functions, which fail to properly validate file extensions during file uploads. This lack of validation allows an attacker to upload executable files disguised as smileys. The vulnerability is classified as a Cross-Site Scripting (XSS) issue (CWE-79) that escalates to remote code execution (RCE) with the privileges of the web server user (www-data). Exploitation requires user interaction and low privileges but can lead to a complete compromise of the affected system due to the ability to execute arbitrary code remotely. The vulnerability has a CVSS 3.1 base score of 9.0, indicating critical severity, with a vector showing low attack complexity, network attack vector, high impact on confidentiality, integrity, and availability, partial privileges required, scope change, and requiring user interaction. Fixed versions include 5.3.4, 5.2.6, 5.1.7, and 5.0.9. No known exploits are currently reported in the wild, but the high severity and ease of exploitation make it a significant threat. The vulnerability highlights improper input validation and insufficient security controls in file upload mechanisms within web applications, a common attack vector for web-based RCE.

Potential Impact

For European organizations using Stud.IP, an open-source learning management system popular in academic institutions, this vulnerability poses a severe risk. Successful exploitation could allow attackers to execute arbitrary code on servers hosting Stud.IP, potentially leading to data breaches, unauthorized access to sensitive academic and personal data, disruption of educational services, and lateral movement within institutional networks. Given that Stud.IP is widely used in universities and educational institutions across Europe, the impact could extend to critical educational infrastructure, affecting confidentiality, integrity, and availability of educational resources and user data. Additionally, compromised servers could be leveraged as footholds for further attacks against connected networks or used to distribute malware. The requirement for user interaction (likely an admin uploading files) means insider threats or phishing campaigns targeting administrators could facilitate exploitation. The vulnerability's ability to escalate from XSS to RCE significantly increases the threat level, making timely patching essential to prevent potential widespread impact.

Mitigation Recommendations

1. Immediate upgrade to the fixed versions of Stud.IP (5.3.4, 5.2.6, 5.1.7, or 5.0.9) is the most effective mitigation. 2. Implement strict file upload validation controls, including whitelisting allowed file types and verifying file extensions and MIME types on both client and server sides. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious file uploads and XSS payloads targeting the Admin_SmileysController endpoints. 4. Restrict administrative access to the upload and edit functionalities to trusted users only, and enforce multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise. 5. Monitor logs for unusual file upload activities or execution of unexpected processes under the www-data user. 6. Conduct regular security audits and penetration testing focusing on file upload functionalities. 7. Educate administrators on phishing and social engineering risks that could lead to exploitation via user interaction. 8. If immediate patching is not possible, consider temporarily disabling the smiley upload/edit features or restricting them via network segmentation or access control lists.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3b8

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 2:13:35 AM

Last updated: 7/26/2025, 8:09:54 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats