Vulnerability Details : CVE-2023-41892
Public exploit exists!
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
Products affected by CVE-2023-41892
- cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41892
90.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2023-41892
-
Craft CMS unauthenticated Remote Code Execution (RCE)
Disclosure Date: 2023-09-13First seen: 2024-01-23exploit/linux/http/craftcms_unauth_rce_cve_2023_41892This module exploits Remote Code Execution vulnerability (CVE-2023-41892) in Craft CMS which is a popular content management system. Craft CMS versions between 4.0.0-RC1 - 4.4.14 are affected by this vulnerability allowing attackers to execute arbitrary code remotely,
CVSS scores for CVE-2023-41892
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L |
3.9
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2023-41892
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-41892
-
https://github.com/craftcms/cms/commit/c0a37e15cc925c473e60e27fe64054993b867ac1#diff-47dd43d86f85161944dfcce2e41d31955c4184672d9bd9d82b948c6b01b86476
Call beforeAction() up front · craftcms/cms@c0a37e1 · GitHubPatch
-
http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html
Craft CMS 4.4.14 Remote Code Execution ≈ Packet Storm
-
https://github.com/craftcms/cms/commit/7359d18d46389ffac86c2af1e0cd59e37c298857
Fixed an RCE vulnerability · craftcms/cms@7359d18 · GitHubPatch
-
https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4415---2023-07-03-critical
cms/CHANGELOG.md at develop · craftcms/cms · GitHubRelease Notes
-
https://github.com/craftcms/cms/commit/a270b928f3d34ad3bd953b81c304424edd57355e
Take two · craftcms/cms@a270b92 · GitHubPatch
-
https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g
Remote Code Execution · Advisory · craftcms/cms · GitHubPatch;Vendor Advisory
-
https://github.com/craftcms/cms/commit/c0a37e15cc925c473e60e27fe64054993b867ac1
Call beforeAction() up front · craftcms/cms@c0a37e1 · GitHubPatch
Jump to