CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

New RCE Vulnerability in E-Safenet Could Expose Sensitive Docs

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

A critical remote code execution (RCE) vulnerability (CNVD-2023-59457) was discovered in E-Safenet Electronic Document Security Management System, a widely used enterprise-grade solution for document encryption, access control, and operation auditing.

The flaw allows unauthenticated attackers to bypass authentication and potentially execute arbitrary code on the server. This vulnerability poses significant risks to organizations dealing with sensitive internal documents.


Overview

Discovered: May 2023

Disclosed to vendor: May 23, 2023

Vendor patch released: July 28, 2023

In-the-wild exploitation observed: December 2023

CVE/CNVD ID: CNVD-2023-59457

Chaitin Security researchers discovered and responsibly disclosed the vulnerability. They delayed public disclosure until signs of exploitation were detected in December to give enterprises ample time to patch.


Vulnerability Details

The vulnerability stems from flaws in the authentication mechanism and unsafe handling of user-supplied input.

  • Authentication bypass: Attackers can exploit inconsistencies in the login flow to gain unauthorized access to the backend.
  • Remote code execution: Crafted inputs can trigger unsafe code execution, granting system-level access.

Impact

  • Full remote code execution (RCE)
  • Unauthorized backend access
  • Potential data breaches, ransomware deployment, or full system takeover
  • High business risk due to the platform’s role in handling confidential documents

Affected Versions

  • All versions prior to E-Safenet July 2023 patch release

Mitigation

Temporary Workarounds

  • Restrict access: Only allow trusted IP ranges to access the admin interface.
  • Audit logs: Enable detailed login and file access logging. Monitor for unusual login attempts or path tampering.
  • Sanitize inputs: Enforce strict validation on all user-submitted input related to document handling.

Official Fix


Exploit Reproduction


Detection & Threat Intelligence Support

Product Detection Status
Yuntu Supports fingerprint identification and behavior-based PoC detection
Dongjian Supports detection via custom PoC
Quanxi Signature update with detection rules released on Dec 8
Muyun Detection supported via emergency vuln library update EMERVULN-23.12.008 (Platform version 23.05.001+)

Timeline

  • May 23, 2023 – Vulnerability reported to authorities by Chaitin
  • July 28, 2023 – Vendor released public security patch
  • December 8, 2023 – Public advisory issued after observing real-world attacks

References


If you're running E-Safenet in your organization, patch now. RCE vulnerabilities—especially those observed in the wild—should never be ignored.


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)