Vulnerability Details : CVE-2022-43275
Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2022-43275
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 31 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-43275
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
[email protected] |
CWE ids for CVE-2022-43275
-
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.Assigned by: [email protected] (Primary)
References for CVE-2022-43275
-
https://github.com/01001000entai/bug_report/blob/main/vendors/mayuri_k/canteen-management-system/RCE-1.md
Exploit;Third Party Advisory
Products affected by CVE-2022-43275
- cpe:2.3:a:canteen_management_system_project:canteen_management_system:1.0:*:*:*:*:*:*:*