OpenRapid RapidCMS 1.3.1 uploadicon.php isImg fileName ବିସ୍ତାରିତ ଅଧିକାର

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu OpenRapid RapidCMS 1.3.1 keessatti argameera. Miidhaan irra gahe is hojii isImg faayilii /admin/config/uploadicon.php keessa. Dhugumatti jijjiirraa irratti raawwatame fileName gara ବିସ୍ତାରିତ ଅଧିକାର geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-434 si geessa. Beekumsi kun yeroo 09/29/2023 ifoomsifameera akka 10. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2023-5262 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

3 ଆଡାପ୍ଟେସନ୍ · 73 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
09/29/2023 07:27 AM
ଅଦ୍ୟତନ 1/2
10/22/2023 08:45 AM
ଅଦ୍ୟତନ 2/2
10/22/2023 08:49 AM
software_vendorOpenRapidOpenRapidOpenRapid
software_nameRapidCMSRapidCMSRapidCMS
software_version1.3.11.3.11.3.1
software_file/admin/config/uploadicon.php/admin/config/uploadicon.php/admin/config/uploadicon.php
software_functionisImgisImgisImg
software_argumentfileNamefileNamefileName
vulnerability_cweCWE-434 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-434 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-434 (ବିସ୍ତାରିତ ଅଧିକାର)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/OpenRapid/rapidcms/issues/10https://github.com/OpenRapid/rapidcms/issues/10https://github.com/OpenRapid/rapidcms/issues/10
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/yhy217/rapidcms-vul/issues/5https://github.com/yhy217/rapidcms-vul/issues/5https://github.com/yhy217/rapidcms-vul/issues/5
source_cveCVE-2023-5262CVE-2023-5262CVE-2023-5262
cna_responsibleVulDBVulDBVulDB
advisory_date1695938400 (09/29/2023)1695938400 (09/29/2023)1695938400 (09/29/2023)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.75.75.7
cvss3_meta_basescore6.36.37.1
cvss3_meta_tempscore5.75.76.9
price_0day$0-$5k$0-$5k$0-$5k
advisory_identifier1010
cve_assigned1695938400 (09/29/2023)1695938400 (09/29/2023)
cve_nvd_summaryA vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871.A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore6.5
cvss3_nvd_basescore8.8
cvss3_cna_basescore6.3

Want to stay up to date on a daily basis?

Enable the mail alert feature now!