CVE-2023-22855

CRITICAL

Kardex Control Center - Code Injection

Title source: rule

Description

Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.

Exploits (2)

exploitdb WORKING POC
by Patrick Hener · pythonremotewindows
https://www.exploit-db.com/exploits/51239
nomisec WRITEUP
by vianic · poc
https://github.com/vianic/CVE-2023-22855

Scores

CVSS v3 9.8
EPSS 0.6157
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-94
Status published
Products (1)
kardex/kardex_control_center 5.7.12\+0-a203c2a213-master
Published Feb 15, 2023
Tracked Since Feb 18, 2026