Vulnerability Details : CVE-2023-1105
Potential exploit
External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.
Vulnerability category: File inclusion
Products affected by CVE-2023-1105
- cpe:2.3:a:flatpress:flatpress:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-1105
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-1105
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
huntr.dev | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.8
|
5.2
|
NIST |
CWE ids for CVE-2023-1105
-
The product allows user input to control or influence paths or file names that are used in filesystem operations.Assigned by: security@huntr.dev (Primary)
References for CVE-2023-1105
-
https://github.com/flatpressblog/flatpress/commit/5d5c7f6d8f072d14926fc2c3a97cdd763802f170
fixes #179, preventing path traversal · flatpressblog/flatpress@5d5c7f6 · GitHubPatch
-
https://huntr.dev/bounties/4089a63f-cffd-42f3-b8d8-e80b6bd9c80f
File Deletion Detected vulnerability found in flatpressExploit;Issue Tracking;Patch;Third Party Advisory
Jump to