Vulnerability Details : CVE-2023-23607
erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2023-23607
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 47 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-23607
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
nvd@nist.gov |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
security-advisories@github.com |
CWE ids for CVE-2023-23607
-
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-23607
-
https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq
Unrestricted file upload leads to Remote Code Execution · Advisory · erohtar/Dasherr · GitHubExploit;Third Party Advisory
-
https://github.com/erohtar/Dasherr/commit/445325c7cf1148a8cd38af3a90789c6cbf6c5112
Update filesave.php · erohtar/Dasherr@445325c · GitHubPatch;Third Party Advisory
Products affected by CVE-2023-23607
- cpe:2.3:a:dasherr_project:dasherr:*:*:*:*:*:*:*:*