Vulnerability Details : CVE-2015-5643
The installer in ICZ MATCHA INVOICE before 2.5.7 does not properly configure the database, which allows remote attackers to execute arbitrary PHP code via unspecified vectors.
Products affected by CVE-2015-5643
- cpe:2.3:a:icz:matchasns:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5643
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5643
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2015-5643
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5643
-
http://jvn.jp/en/jp/JVN66984217/index.html
JVN#66984217: MATCHA INVOICE vulnerable to code injectionVendor Advisory
-
http://oss.icz.co.jp/news/?p=1073
抹茶請求書 2.5.7リリースのお知らせ | ニュース一覧Vendor Advisory
-
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000144
JVNDB-2015-000144 - JVN iPedia - 脆弱性対策情報データベースVendor Advisory
Jump to