Vulnerability Details : CVE-2023-3800
A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Products affected by CVE-2023-3800
- cpe:2.3:a:wolfcode:easyadmin8:2.0.2.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3800
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3800
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.7
|
LOW | AV:A/AC:H/Au:M/C:P/I:P/A:P |
2.0
|
6.4
|
VulDB | |
3.9
|
LOW | CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L |
0.5
|
3.4
|
VulDB | |
3.9
|
LOW | CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L |
0.5
|
3.4
|
VulDB | 2024-02-29 |
6.6
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.7
|
5.9
|
NIST |
CWE ids for CVE-2023-3800
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: cna@vuldb.com (Primary)
References for CVE-2023-3800
-
https://vuldb.com/?id.235068
CVE-2023-3800: EasyAdmin8 File Upload Module index.html unrestricted uploadThird Party Advisory
-
https://vuldb.com/?ctiid.235068
CVE-2023-3800: EasyAdmin8 File Upload Module index.html unrestricted uploadPermissions Required;Third Party Advisory
-
https://github.com/wolf-leo/EasyAdmin8/issues/1
Arbitrary file upload vulnerability causing getshell · Issue #1 · wolf-leo/EasyAdmin8 · GitHubIssue Tracking;Third Party Advisory
Jump to