CVE-2023-53981
BaseFortify
Publication date: 2025-12-22
Last updated on: 2025-12-27
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thibaud-rohmer | photoshow | 3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2023-53981 is a remote code execution vulnerability in PhotoShow 3.0 that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers exploit the ffmpeg configuration by base64 encoding a reverse shell command and injecting it via a crafted video upload process. This enables execution of arbitrary commands on the server by manipulating the exiftran_path parameter in the admin settings, which is then triggered when a video file is uploaded. [2, 3, 4]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including allowing an attacker with administrator credentials to execute arbitrary commands on the server remotely. This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, and potential use of the compromised server as a foothold for further attacks. The attacker can gain a reverse shell, effectively controlling the server and its resources. [2, 3, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves monitoring for suspicious administrative activity and crafted HTTP POST requests targeting the PhotoShow admin endpoints. Specifically, look for POST requests to '/?t=Login' with admin credentials, followed by POST requests to '/?t=Adm&a=Set' containing unusual or base64-encoded payloads in the 'exiftran_path' parameter. Additionally, monitor uploads to '/?a=Upl' for crafted video files triggering the exploit. Network detection can include setting up IDS/IPS rules to flag base64-encoded commands or reverse shell patterns in HTTP traffic. On the server, review logs for changes to the exiftran_path configuration or unexpected execution of shell scripts. Example commands for detection could include using curl or wget to simulate login and configuration requests, or using tools like tcpdump or Wireshark to capture suspicious traffic. For example, monitoring HTTP POST requests with grep: `grep -i 'exiftran_path' /var/log/apache2/access.log` or searching for base64 strings in logs: `grep -Eo '[A-Za-z0-9+/=]{40,}' /var/log/apache2/access.log`. [3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Restrict administrative access to trusted users only and enforce strong authentication. 2) Disable or restrict the ability to modify the 'exiftran_path' and ffmpeg configuration settings via the admin interface. 3) Monitor and audit all administrative changes and video uploads closely. 4) Apply input validation and sanitization on configuration parameters to prevent command injection. 5) If possible, update or patch PhotoShow to a version that addresses this vulnerability or apply custom patches to sanitize inputs. 6) As a temporary measure, restrict upload functionality or disable video uploads until a fix is applied. 7) Use network-level controls such as firewall rules to limit outbound connections from the server to prevent reverse shell callbacks. 8) Set up a netcat listener to detect unexpected reverse shell connections and monitor for unusual processes on the server. 9) Review and tighten file permissions and server configurations to limit the impact of any exploitation. [2, 4]