CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Zero-Day in eSafeNet Document Security Platform (CVE Unconfirmed)

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

In December 2023, a critical Remote Code Execution (RCE) vulnerability in eSafeNet Electronic Document Security Management System was publicly disclosed. This vulnerability, which requires no prior authentication, puts sensitive enterprise data and internal systems at serious risk.

If your organization uses this platform, you should patch it immediately.


What is eSafeNet?

eSafeNet is a widely-used enterprise software that offers document encryption, permission control, and audit logging — all aimed at improving document security and management efficiency.


Vulnerability Overview

Root Cause

The vulnerability stems from insufficient access controls in the backend. By exploiting a file read weakness (e.g., using directory traversal like ../), attackers can retrieve critical files on the server — including credentials.

Once authenticated, the attacker can upload arbitrary files to sensitive locations and execute malicious code remotely.

Exploit Characteristics

  • Payloads often contain path traversal patterns like ../
  • Targets non-standard 8021 TCP port (default config)
  • Exploitable without authentication
  • Can lead to full remote code execution

Impact

  • RCE Risk: Attackers can execute arbitrary commands or scripts on the target server
  • Data Exposure: Sensitive files, configurations, or internal credentials could be leaked
  • Ransomware Threats: Uploading and executing ransomware is a potential attack vector

Affected Versions

  • All versions <= V5.6.1.109.122

Mitigation & Fixes

Temporary Workarounds

  • Restrict Access: Limit 8021 port access to trusted IPs. Avoid exposing it to the public internet.
  • Access Control: Strengthen permission policies on server endpoints.
  • Log Monitoring: Track and investigate suspicious uploads or path traversal attempts in server logs.

Permanent Fix

  • Official patches have been released. Contact eSafeNet support via https://www.esafenet.com to apply the November patch update.

Reproduction & Detection Tools

Remote Scanner (X-POC)

xpoc -r 417 -t http://xpoc.org
Enter fullscreen mode Exit fullscreen mode

Tool repo:


Local Scanner (Muyun)

./yisaitong_rce_ct_1002008_scanner_windows_amd64.exe scan
Enter fullscreen mode Exit fullscreen mode

Tool download:


Product Support Matrix

Product Support Details
Yuntu Fingerprint & PoC detection supported
Dongjian Supports custom PoC
SafeLine Detects exploit behavior by default
Quanxi Default detection support
Muyun Patch package EMERVULN-23.12.013 available for versions ≥ 23.05.001

Timeline

  • Dec 12, 2023: Vulnerability details disclosed online
  • Dec 13, 2023: Vulnerability reproduced by Chaitin Research
  • Dec 13, 2023: Public advisory published by Chaitin Security Response Center

References


Join the SafeLine Community

If you continue to experience issues, feel free to contact SafeLine support for further assistance.

Top comments (0)