Patch
CVE-2023-23607
with vRx
Fixing vulnerable target
To fix the vulnerable target, copy the remediation script to the container/machine where the vulnerable Dasherr project is available and run the script.
kali@kali:~/vicarious/cve-2023-23607/Dasherr$ docker cp remediation.sh test:/
kali@kali:~/vicarious/cve-2023-23607/Dasherr$ docker exec -it test bash
root@2c3c6bf3735e:/var/www/html# bash /remediation.sh
[*] The target has been successfully patched!
root@2c3c6bf3735e:/var/www/html#
root@2c3c6bf3735e:/var/www/html# exit
kali@kali:~/vicarious/cve-2023-23607/Dasherr$ go run exploit.go -t http://127.0.0.1
Exploit failed with error:
kali@kali:~/vicarious/cve-2023-23607/Dasherr$
As we can notice from the above output, the target was successfully patched after running the remediation script.
The remediation script updates the affected file to check if the file extension is .json and only then let the file be uploaded. This prevents the initial arbitrary PHP file upload vulnerability.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.