Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7305: CWE-434 Unrestricted Upload of File with Dangerous Type in Guangzhou Smart Software Co., Ltd. SmartBI

0
Critical
VulnerabilityCVE-2023-7305cvecve-2023-7305cwe-434
Published: Wed Oct 15 2025 (10/15/2025, 01:24:53 UTC)
Source: CVE Database V5
Vendor/Project: Guangzhou Smart Software Co., Ltd.
Product: SmartBI

Description

SmartBI V8, V9, and V10 contain an unrestricted file upload vulnerability via the RMIServlet request handling logic. Under certain configurations or usage patterns, attackers can send specially crafted requests that cause the application to perform sensitive operations or execute arbitrary code on the host. The vendor released a fix in July 2023 to address the underlying flaw. VulnCheck has observed this vulnerability being targeted by the Rondo botnet.

AI-Powered Analysis

AILast updated: 10/15/2025, 02:07:50 UTC

Technical Analysis

CVE-2023-7305 is an unrestricted file upload vulnerability categorized under CWE-434, affecting SmartBI versions V8, V9, and V10 developed by Guangzhou Smart Software Co., Ltd. The vulnerability arises from insufficient validation in the RMIServlet component responsible for handling file upload requests. Attackers can craft malicious requests that bypass file type restrictions, enabling them to upload files with dangerous content such as web shells or executable scripts. Once uploaded, these files can be executed on the host server, allowing attackers to perform sensitive operations or execute arbitrary code remotely. The vulnerability does not require authentication or user interaction, increasing its exploitation potential. The CVSS 4.0 score of 9.2 indicates critical severity, with network attack vector, low attack complexity, and no privileges or user interaction needed. Although no confirmed public exploits exist, the Rondo botnet has been observed scanning and attempting exploitation, indicating active interest from threat actors. The vendor released a patch in July 2023, but unpatched systems remain vulnerable. This vulnerability poses a significant risk to organizations relying on SmartBI for business intelligence and data analytics, as compromise could lead to data breaches, system takeover, and disruption of critical business processes.

Potential Impact

For European organizations, exploitation of CVE-2023-7305 could result in severe consequences including unauthorized access to sensitive business intelligence data, full system compromise, and disruption of analytics services critical for decision-making. The ability to execute arbitrary code remotely without authentication means attackers could deploy ransomware, steal intellectual property, or pivot within internal networks. Industries such as finance, manufacturing, and government agencies using SmartBI for data visualization and reporting are particularly at risk. The breach of confidentiality and integrity of data could lead to regulatory penalties under GDPR and damage to reputation. Additionally, operational downtime caused by exploitation could impact business continuity. The presence of active scanning by the Rondo botnet increases the likelihood of targeted attacks, emphasizing the urgency for European entities to address this vulnerability promptly.

Mitigation Recommendations

European organizations should immediately verify their SmartBI versions and apply the vendor-released patch from July 2023 to remediate CVE-2023-7305. In addition to patching, implement strict file upload validation controls at the application and network layers, including whitelisting allowed file types and scanning uploads for malicious content. Employ web application firewalls (WAFs) configured to detect and block suspicious RMIServlet requests. Conduct thorough audits of existing uploaded files to identify and remove any unauthorized or malicious files. Monitor network traffic and logs for indicators of compromise related to Rondo botnet activity or unusual file upload patterns. Restrict access to SmartBI management interfaces to trusted IP addresses and enforce least privilege principles. Regularly update and harden the underlying operating systems and middleware hosting SmartBI. Finally, educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving arbitrary code execution via file upload.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-07-24T13:59:55.261Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68eefe3955734f1608e6823f

Added to database: 10/15/2025, 1:51:53 AM

Last enriched: 10/15/2025, 2:07:50 AM

Last updated: 10/15/2025, 5:31:08 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats