A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.243643 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.243643 | Third Party Advisory VDB Entry |
https://github.com/flusity/flusity-CMS/issues/4 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
08 Nov 2023, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:* | |
CWE | CWE-434 | |
First Time |
Flusity flusity
|
07 Nov 2023, 20:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:flusity:cms:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Flusity cms
Flusity |
|
References | (MISC) https://vuldb.com/?ctiid.243643 - Permissions Required, Third Party Advisory, VDB Entry | |
References | (MISC) https://vuldb.com/?id.243643 - Third Party Advisory, VDB Entry | |
References | (MISC) https://github.com/flusity/flusity-CMS/issues/4 - Exploit, Issue Tracking, Third Party Advisory |
27 Oct 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-27 02:15
Updated : 2024-05-17 02:33
NVD link : CVE-2023-5812
Mitre link : CVE-2023-5812
JSON object : View
Products Affected
flusity
- flusity
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type