Vulnerability Details : CVE-2022-23626
m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Vulnerability category: Input validation
Products affected by CVE-2022-23626
- cpe:2.3:a:blog_project:blog:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-23626
3.34%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-23626
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
1.8
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2022-23626
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Secondary)
-
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.Assigned by: nvd@nist.gov (Primary)
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Secondary)
References for CVE-2022-23626
-
https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4
Insufficient checking of uploaded files · Advisory · m1k1o/blog · GitHubThird Party Advisory
-
https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2ef
check image create errors. · m1k1o/blog@6f5e59f · GitHubPatch;Third Party Advisory
-
http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html
m1k1o's Blog 1.3 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to