Skip to main content

CVE-2023-6853: CWE-918 Server-Side Request Forgery in kalcaddle KodExplorer

Medium
VulnerabilityCVE-2023-6853cvecve-2023-6853cwe-918
Published: Sat Dec 16 2023 (12/16/2023, 12:00:05 UTC)
Source: CVE
Vendor/Project: kalcaddle
Product: KodExplorer

Description

A vulnerability classified as critical was found in kalcaddle KodExplorer up to 4.51.03. Affected by this vulnerability is the function index of the file plugins/officeLive/app.php. The manipulation of the argument path leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The identifier of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier VDB-248221 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:42:43 UTC

Technical Analysis

CVE-2023-6853 is a server-side request forgery (SSRF) vulnerability identified in the kalcaddle KodExplorer product, specifically affecting versions up to 4.51.03. The vulnerability resides in the 'index' function of the file plugins/officeLive/app.php. An attacker can manipulate the 'path' argument to cause the server to make unauthorized requests to internal or external resources. SSRF vulnerabilities allow attackers to abuse the server as a proxy to access or interact with internal systems that are otherwise inaccessible, potentially leading to information disclosure, internal network reconnaissance, or further exploitation. This vulnerability can be exploited remotely without user interaction but requires some level of privileges (PR:L in CVSS), indicating that the attacker must have limited privileges on the system to exploit it. The CVSS score is 6.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability. The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. The vendor has released an update, version 4.52.01, which patches this vulnerability (patch identifier 5cf233f7556b442100cf67b5e92d57ceabb126c6). KodExplorer is a web-based file management system often used for collaborative document editing and file sharing, making it a valuable target for attackers seeking to gain access to sensitive internal resources or disrupt operations.

Potential Impact

For European organizations using KodExplorer, this SSRF vulnerability poses a risk of unauthorized internal network access and potential data leakage. Since KodExplorer is used for file management and collaboration, exploitation could lead to exposure of sensitive documents or internal services. The ability to make server-side requests could allow attackers to pivot within the network, potentially accessing internal APIs, databases, or other critical infrastructure. This could result in confidentiality breaches, integrity violations if attackers manipulate internal services, or availability issues if internal resources are overwhelmed or disrupted. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, could face compliance risks and reputational damage if exploited. The requirement for limited privileges reduces the risk somewhat but does not eliminate it, especially in environments where user accounts have broad access or where the application is exposed to external networks.

Mitigation Recommendations

1. Immediate upgrade to KodExplorer version 4.52.01 or later to apply the official patch addressing CVE-2023-6853. 2. Restrict access to the KodExplorer application to trusted users and networks, ideally behind VPNs or internal firewalls, to limit exposure. 3. Implement network segmentation to ensure that even if SSRF is exploited, internal critical systems are not directly reachable from the application server. 4. Monitor application logs for unusual outbound requests initiated by the KodExplorer server, which could indicate exploitation attempts. 5. Employ web application firewalls (WAFs) with rules designed to detect and block SSRF patterns, especially targeting the 'path' parameter in the affected plugin. 6. Review and minimize privileges assigned to users of KodExplorer to reduce the risk posed by compromised accounts. 7. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications used within the organization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-15T16:38:25.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8b8e

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:42:43 AM

Last updated: 7/31/2025, 12:33:29 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats