Dreamer CMS जोपर्यंत 4.1.3 ueditorConfig?action=config विशेषाधिकार वाढीचे प्रमाण वाढले

एक असुरक्षितता जी समस्याग्रस्त म्हणून वर्गीकृत आहे, ती Dreamer CMS जोपर्यंत 4.1.3 मध्ये आढळली आहे. प्रभावित आहे अज्ञात फंक्शन फाइल /upload/ueditorConfig?action=config च्या. सॉफ्टवेअरमध्ये केलेले बदल विशेषाधिकार वाढीचे प्रमाण वाढले यास कारणीभूत ठरतात. CWE वापरून समस्या घोषित केल्याने CWE-552 कडे नेले जाते. कमजोरी प्रकाशित करण्यात आली होती 03/09/2023. सल्ला डाउनलोडसाठी github.com येथे शेअर केला आहे. ही दुर्बलता CVE-2023-4743 म्हणून ओळखली जाते. हल्ला दूरस्थपणे सुरू करणे शक्य आहे. तांत्रिक तपशील उपलब्ध आहेत. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषण सार्वजनिकपणे उघड झाले आहे आणि वापरले जाऊ शकते. सध्याच्या घडीला अंदाजे USD $0-$5k असू शकतो. MITRE ATT&CK प्रकल्पाने हल्ल्याची तंत्रज्ञान T1083 म्हणून घोषित केली आहे. हे प्रूफ-ऑफ-कॉन्सेप्ट म्हणून घोषित केले आहे. शोषण डाउनलोडसाठी github.com येथे शेअर केले आहे. 0-डे म्हणून अंदाजे अंडरग्राउंड किंमत सुमारे $0-$5k होती. VulDB is the best source for vulnerability data and more expert information about this specific topic.

4 बदल · 95 डेटा पॉइंट्स

शेततयार केली
03/09/2023 08:40 AM
अद्ययावत 1/3
29/09/2023 07:47 PM
अद्ययावत 2/3
29/09/2023 07:53 PM
अद्ययावत 3/3
05/04/2025 03:49 AM
advisory_date1693692000 (03/09/2023)1693692000 (03/09/2023)1693692000 (03/09/2023)1693692000 (03/09/2023)
software_typeContent Management SystemContent Management SystemContent Management SystemContent Management System
cvss2_vuldb_avNNNN
cvss2_vuldb_acHHHH
cvss2_vuldb_ciPPPP
cvss2_vuldb_iiNNNN
cvss2_vuldb_aiNNNN
cvss2_vuldb_ePOCPOCPOCPOC
cvss2_vuldb_rcURURURUR
cvss2_vuldb_auSSSS
cvss2_vuldb_rlNDNDNDND
cvss3_vuldb_prLLLL
cvss3_vuldb_rlXXXX
cvss2_vuldb_basescore2.12.12.12.1
cvss2_vuldb_tempscore1.81.81.81.8
cvss3_vuldb_basescore3.13.13.13.1
cvss3_vuldb_tempscore2.82.82.82.8
cvss3_meta_basescore3.13.13.73.7
cvss3_meta_tempscore2.82.83.63.6
price_0day$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorDreamerDreamerDreamerDreamer
software_nameCMSCMSCMSCMS
software_version<=4.1.3<=4.1.3<=4.1.3<=4.1.3
software_file/upload/ueditorConfig?action=config/upload/ueditorConfig?action=config/upload/ueditorConfig?action=config/upload/ueditorConfig?action=config
vulnerability_cweCWE-552 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-552 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-552 (विशेषाधिकार वाढीचे प्रमाण वाढले)CWE-552 (विशेषाधिकार वाढीचे प्रमाण वाढले)
vulnerability_risk1111
cvss3_vuldb_avNNNN
cvss3_vuldb_acHHHH
cvss3_vuldb_uiNNNN
cvss3_vuldb_sUUUU
cvss3_vuldb_cLLLL
cvss3_vuldb_iNNNN
cvss3_vuldb_aNNNN
cvss3_vuldb_ePPPP
cvss3_vuldb_rcRRRR
advisory_urlhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerability
exploit_availability1111
exploit_publicity1111
exploit_urlhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerabilityhttps://github.com/FFR66/Dreamer-CMS_Unauthorized-access-vulnerability
source_cveCVE-2023-4743CVE-2023-4743CVE-2023-4743CVE-2023-4743
cna_responsibleVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cve_assigned1693692000 (03/09/2023)1693692000 (03/09/2023)1693692000 (03/09/2023)
cve_nvd_summaryA vulnerability was found in Dreamer CMS up to 4.1.3. It has been classified as problematic. Affected is an unknown function of the file /upload/ueditorConfig?action=config. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238632. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in Dreamer CMS up to 4.1.3. It has been classified as problematic. Affected is an unknown function of the file /upload/ueditorConfig?action=config. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238632. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in Dreamer CMS up to 4.1.3. It has been classified as problematic. Affected is an unknown function of the file /upload/ueditorConfig?action=config. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238632. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avNN
cvss3_nvd_acHH
cvss3_nvd_prNN
cvss3_nvd_uiNN
cvss3_nvd_sUU
cvss3_nvd_cLL
cvss3_nvd_iLL
cvss3_nvd_aNN
cvss2_nvd_avNN
cvss2_nvd_acHH
cvss2_nvd_auSS
cvss2_nvd_ciPP
cvss2_nvd_iiNN
cvss2_nvd_aiNN
cvss3_cna_avNN
cvss3_cna_acHH
cvss3_cna_prLL
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cLL
cvss3_cna_iNN
cvss3_cna_aNN
cve_cnaVulDBVulDB
cvss2_nvd_basescore2.12.1
cvss3_nvd_basescore4.84.8
cvss3_cna_basescore3.13.1
cve_nvd_summaryesSe encontró una vulnerabilidad en Dreamer CMS hasta 4.1.3. Ha sido clasificado como problemático. Una función desconocida del archivo /upload/ueditorConfig?action=config es afectada por esta vulnerabilidad. La manipulación conduce a archivos o directorios accesibles. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es difícil. El exploit ha sido divulgado al público y puede utilizarse. El identificador de esta vulnerabilidad es VDB-238632. NOTA: Se contactó primeramente al proveedor sobre esta divulgación, pero no respondió de ninguna manera.
cvss2_cna_avN
cvss2_cna_acH
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiN
cvss2_cna_aiN
cvss2_cna_basescore2.1
cvss4_vuldb_avN
cvss4_vuldb_acH
cvss4_vuldb_prL
cvss4_vuldb_uiN
cvss4_vuldb_vcL
cvss4_vuldb_viN
cvss4_vuldb_vaN
cvss4_vuldb_eP
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss4_vuldb_bscore2.3
cvss4_vuldb_btscore1.3

Do you know our Splunk app?

Download it now for free!