Sploit.io - Search

Product: U-Office Force, version: 20.0.7668D

CVE-2023-32755

Severity: MEDIUM

Description: e-Excellence U-Office Force generates an error message in webiste service. An unauthenticated remote attacker can obtain partial sensitive system information from error message by sending a crafted command.

CVSS Score: 5.3

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001600000
  • Percentile: 0.366590000
  • Date: 2026-04-24

ExploitDB

No data available.

HackerOne Data

  • Rank: 9178
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • e-Excellence U-Office Force - Versions: 20.0.7668D

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-32755 in e-Excellence U-Office Force allows an unauthenticated remote attacker to extract partial sensitive system information through a crafted command sent to the website service, resulting in an error message leakage. The vulnerability is rated as MEDIUM severity with a CVSS score of 5.3. The business impact stems from potential disclosure of system details which could aid in further attacks. The likelihood of exploitation is moderate, as it requires a crafted command but doesn’t require authentication. The vulnerability primarily impacts confidentiality; while integrity and availability are not directly impacted, knowing system details could support future attacks affecting those areas. The EPSS score is quite low at 0.0016, suggesting the vulnerability may not be widely exploited, but the potential for information leakage warrants attention.

    2. Potential Attack Scenarios
    An attacker can leverage this vulnerability by sending a specifically crafted command to the U-Office Force website service. For example, the attacker could send a command designed to trigger an error message that reveals the underlying operating system version or database type. This can be achieved through a simple HTTP request with the crafted command in a relevant parameter. The process involves sending the command, observing the error message returned by the service, and extracting the sensitive system information. The potential outcome is the attacker gains insight into the system’s configuration, which can aid in crafting more targeted attacks, such as exploiting other vulnerabilities or launching a more sophisticated intrusion attempt.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to update the U-Office Force version to 24.50SP1 or later. This update addresses the error message leakage vulnerability. Organizations using version 20.0.7668D should prioritize patching to minimize the risk of information disclosure. Secondary mitigation steps include monitoring network traffic for unusual command requests targeting the U-Office Force service. Further reference and details can be found at https://www.twcert.org.tw/tw/cp-132-7328-d4112-1.html. Regularly reviewing error logs for potentially revealing information is also recommended.

    4. Executive Summary
    e-Excellence U-Office Force is vulnerable to an information leakage issue (CVE-2023-32755) that allows attackers to gather partial sensitive system information without needing to authenticate. This vulnerability is rated as medium severity and could allow attackers to gain insights into the system configuration, potentially aiding in more targeted attacks. The primary mitigation is to update to version 24.50SP1 or later. Addressing this vulnerability is important to protect sensitive system details and reduce the overall attack surface. While the risk isn't critical, proactive patching will improve the security posture and prevent potential future exploitation. It's recommended to prioritize this update as part of routine system maintenance to minimize the risk of information disclosure.

    CVE-2023-32756

    Severity: HIGH

    Description: e-Excellence U-Office Force has a path traversal vulnerability within its file uploading and downloading functions. An unauthenticated remote attacker can exploit this vulnerability to read arbitrary system files, but can’t control system or disrupt service.

    CVSS Score: 7.5

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.001190000
    • Percentile: 0.306140000
    • Date: 2026-04-24

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9178
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • e-Excellence U-Office Force - Versions: 20.0.7668D

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability CVE-2023-32756 is a path traversal vulnerability affecting e-Excellence U-Office Force, specifically version 20.0.7668D. This vulnerability allows an unauthenticated remote attacker to read arbitrary system files. The nature of the vulnerability stems from insufficient validation of file paths during upload and download processes. The business impact is moderate to high. While the attacker cannot control the system or disrupt service, the compromise of sensitive files can lead to data breaches, exposure of confidential information, and potential downstream impacts on business operations. The likelihood of exploitation is considered moderate due to the ease of access (unauthenticated) and the common nature of path traversal vulnerabilities. The ease of exploitation is also moderate, requiring relatively simple manipulation of file paths. The primary impact is on confidentiality, with a high potential for sensitive data exposure. Integrity and Availability impacts are currently considered low, but could increase if the attacker leverages the read files to inform further attacks. The EPSS score of 0.001190000 suggests a relatively low probability of widespread exploitation, but the potential impact justifies prompt attention.

      2. Potential Attack Scenarios
      An attacker could exploit this vulnerability by crafting a malicious file request that includes ".." sequences to traverse up the directory structure and access files outside the intended upload/download directory. For example, an attacker could request a file using a URL similar to: http://uoffice.example.com/download.php?file=../../../etc/passwd. This request would attempt to download the /etc/passwd file from the system. The attacker can then analyze the contents of the retrieved file for user accounts, system configurations, or other sensitive data. The attack vector is network-based, meaning it can be launched from anywhere with network access to the affected U-Office Force instance. The attack process involves sending a crafted request and analyzing the response. Potential outcomes include successful retrieval of system files like configuration files, password hashes (depending on system configuration), and potentially sensitive documents stored on the server.

      3. Mitigation Recommendations
      The primary mitigation for CVE-2023-32756 is to update the e-Excellence U-Office Force version to 24.50SP1 or later. This updated version includes fixes for the path traversal vulnerability. In the interim, organizations can implement web application firewall (WAF) rules to filter file requests and block those containing excessive ".." sequences. Input validation should be strengthened on the server-side to ensure that file paths are properly sanitized before being used to access files. Regularly review file access permissions to limit the scope of potential data exposure. Monitor logs for suspicious file access patterns. Relevant resources include the TWCert advisory at https://www.twcert.org.tw/tw/cp-132-7329-d8e4c-1.html and PacketStorm details at https://packetstormsecurity.com/search/?q=CVE-2023-32756.

      4. Executive Summary
      e-Excellence U-Office Force is affected by a path traversal vulnerability (CVE-2023-32756) that allows attackers to read arbitrary system files without needing to authenticate. While attackers can’t immediately take control of the system, they can potentially steal sensitive data, including configuration files and potentially user information. This vulnerability presents a moderate to high risk to our organization, as a data breach could impact business operations and customer trust. The recommended action is to update U-Office Force to version 24.50SP1 or later as soon as possible. Implementing a WAF and strengthening input validation are also valuable interim steps. Prompt action is crucial to minimize the risk of data exposure and maintain the confidentiality of our information.

      CVE-2023-32757

      Severity: CRITICAL

      Description: e-Excellence U-Office Force file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker without logging the service can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.

      CVSS Score: 9.8

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.005480000
      • Percentile: 0.679560000
      • Date: 2026-04-24

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9178
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • e-Excellence U-Office Force - Versions: 20.0.7668D

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability, CVE-2023-32757, resides in the file uploading function of e-Excellence U-Office Force, specifically version 20.0.7668D. The core issue is a lack of proper file type validation, allowing an unauthenticated remote attacker to upload arbitrary files. This represents a critical risk, as indicated by the CVSS base score of 9.8. The likelihood of exploitation is high due to the unauthenticated nature of the attack – no login is required. Exploitation is also relatively easy, given the common nature of file upload functionalities. The impact on confidentiality, integrity, and availability is high. Attackers could upload malicious files (e.g., web shells, executables) leading to data breaches, modification of critical files, or even denial of service. The EPSS score of 0.005480000 suggests a reasonable probability of exploitation given the broad usage of file uploading functionality. Business impact could include data loss, service disruption, reputational damage, and potential financial losses.

        2. Potential Attack Scenarios
        An attacker could leverage this vulnerability to upload a PHP web shell disguised as a common image file (e.g., a JPG). The attacker would then access the uploaded file via a web browser, effectively gaining remote code execution on the U-Office Force server. This allows the attacker to browse the server's file system, execute commands, and potentially escalate privileges. The attack vector is network-based, meaning the attacker can exploit the vulnerability from anywhere with network access to the U-Office Force instance. The attack process involves sending a specially crafted HTTP POST request with the malicious file attached. The potential outcome is complete compromise of the U-Office Force server, leading to data exfiltration, modification, or destruction. Another scenario includes uploading a malicious executable file. If the server has appropriate permissions to run the uploaded file, the attacker could gain control of the system.

        3. Mitigation Recommendations
        The primary mitigation is to update e-Excellence U-Office Force to version 24.50SP1 or later. This version incorporates improved file type validation, preventing the upload of dangerous files. Immediate action should be taken to apply the update, prioritizing production systems. In addition, consider implementing Web Application Firewall (WAF) rules to filter file uploads, specifically looking for file extensions commonly used in attacks (e.g., php, asp, jsp). Review and tighten file upload configurations, limiting accepted file types to only those absolutely necessary. Regularly monitor file upload directories for unexpected files or changes. Further details regarding the vulnerability and patching can be found at: https://www.twcert.org.tw/tw/cp-132-7330-94442-1.html.

        4. Executive Summary
        e-Excellence U-Office Force is vulnerable to a critical file upload vulnerability (CVE-2023-32757) that allows attackers to upload arbitrary files without authentication. This could lead to full control of the server, resulting in potential data breaches, service disruption, and financial losses. The vulnerability is relatively easy to exploit and poses a significant risk to organizations using U-Office Force. It is crucial to update to version 24.50SP1 or later as soon as possible. This update will prevent attackers from uploading malicious files and help protect sensitive data and ensure continued service availability. This vulnerability represents a high priority for remediation due to its critical severity and ease of exploitation, making it essential to apply the patch promptly to minimize potential business impact.