Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-22855 PoC — Kardex Control Center 代码注入漏洞

Source
Associated Vulnerability
Title:Kardex Control Center 代码注入漏洞 (CVE-2023-22855)
Description:Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution. It spawns a web interface listening on port 8088. A user-controllable path is handed to a path-concatenation method (Path.Combine from .NET) without proper sanitisation. This yields the possibility of including local files, as well as remote files on SMB shares. If one provides a file with the extension .t4, it is rendered with the .NET templating engine mono/t4, which can execute code.
Description
Security Vulnerability - Kardex Mlog MCC
Readme
# CVE-2023-22855

This vulnerability was discovered and disclosed by Patrick Hener and myself. This repository will hold the advisory and the link to the exploit.

This repository is only for educational purposes.

# Links

- Vendor Website: [https://www.kardex.com/en/mlog-control-center](https://www.kardex.com/en/mlog-control-center)
- Exploit on Exploit-DB: [https://www.exploit-db.com/exploits/51239](https://www.exploit-db.com/exploits/51239)
- Exploit on Patrick Hener's Github [https://github.com/patrickhener/CVE-2023-22855/tree/main/exploit](https://github.com/patrickhener/CVE-2023-22855/tree/main/exploit)
- Blog Post Advisory: [https://hesec.de/posts/CVE-2023-22855](https://hesec.de/posts/cve-2023-22855)
- Blog Post Thinking Objects: [https://to.com/blog/advisory-kardex-mlog-CVE-2023-22855](https://to.com/blog/advisory-kardex-mlog-CVE-2023-22855)
- Mitre: [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22855)
- NVD Entry: [https://nvd.nist.gov/vuln/detail/CVE-2023-22855](https://nvd.nist.gov/vuln/detail/CVE-2023-22855)
File Snapshot

[4.0K] /data/pocs/432154c5b4e5d35efd7598cfa1de35dec1bdc20c ├── [6.0K] advisory.md └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →