Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.
Published 2023-06-02 13:15:10
Updated 2023-06-09 22:23:49
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2023-3032

Probability of exploitation activity in the next 30 days: 0.05%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 17 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2023-3032

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
8.8
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.8
5.9
NIST
8.1
HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
2.8
5.2
Switzerland Government Common Vulnerability Program

CWE ids for CVE-2023-3032

  • The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
    Assigned by:
    • nvd@nist.gov (Primary)
    • vulnerability@ncsc.ch (Secondary)

References for CVE-2023-3032

Products affected by CVE-2023-3032

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!