Vulnerability Details : CVE-2023-23607
Potential exploit
erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.
Vulnerability category: Execute code
Products affected by CVE-2023-23607
- cpe:2.3:a:dasherr_project:dasherr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23607
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23607
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2023-23607
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-23607
-
https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq
Unrestricted file upload leads to Remote Code Execution · Advisory · erohtar/Dasherr · GitHubExploit;Third Party Advisory
-
https://github.com/erohtar/Dasherr/commit/445325c7cf1148a8cd38af3a90789c6cbf6c5112
Update filesave.php · erohtar/Dasherr@445325c · GitHubPatch;Third Party Advisory
Jump to