Vulnerability Details : CVE-2023-0783
Potential exploit
A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability.
Products affected by CVE-2023-0783
- cpe:2.3:a:shopex:ecshop:4.1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-0783
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0783
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:L/Au:M/C:P/I:P/A:P |
6.4
|
6.4
|
VulDB | |
4.7
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
VulDB | |
4.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L |
1.2
|
3.4
|
VulDB | 2024-02-29 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-0783
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-0783
-
https://vuldb.com/?ctiid.220641
Login requiredPermissions Required;Third Party Advisory
-
https://github.com/jingping911/exshopbug/blob/main/README.md
exshopbug/README.md at main · jingping911/exshopbug · GitHubExploit;Third Party Advisory
-
https://vuldb.com/?id.220641
Login requiredThird Party Advisory
Jump to