Vulnerability Details : CVE-2023-2551
PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1.
Vulnerability category: File inclusion
Products affected by CVE-2023-2551
- cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-2551
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-2551
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
huntr.dev | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-2551
-
The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.Assigned by: security@huntr.dev (Secondary)
-
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-2551
-
https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c
Local file inclusion leading to RCE vulnerability found in bumsysExploit;Third Party Advisory
-
https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a
Bug Fixing · unilogies/bumsys@86e29dd · GitHubPatch
Jump to