Vulnerability Details : CVE-2023-38947
Potential exploit
An arbitrary file upload vulnerability in the /languages/install.php component of WBCE CMS v1.6.1 allows attackers to execute arbitrary code via a crafted PHP file.
Vulnerability category: Execute code
Products affected by CVE-2023-38947
- cpe:2.3:a:wbce:wbce_cms:1.6.1:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38947
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38947
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-01 |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2023-38947
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
-
The PHP application uses an old method for processing uploaded files by referencing the four global variables that are set for each file (e.g. $varname, $varname_size, $varname_name, $varname_type). These variables could be overwritten by attackers, causing the application to process unauthorized files.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-38947
-
https://packetstormsecurity.com/files/176018/WBCE-CMS-1.6.1-Shell-Upload.html
WBCE CMS 1.6.1 Shell Upload ≈ Packet Storm
-
https://gitee.com/CTF-hacker/pwn/issues/I7LH2N
WBCE CMS 1.6.1 has a File upload vulnerability via admin/languages/install.php. · Issue #I7LH2N · Pwn师傅/Pwn - GiteeExploit;Issue Tracking;Third Party Advisory
-
https://github.com/capture0x/WBCE_CMS
GitHub - capture0x/WBCE_CMS: WBCE CMS Version : 1.6.1 Remote Command Execution
Jump to