Логотип exploitDog
bind:CVE-2023-2453
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-2453

Количество 3

Количество 3

nvd логотип

CVE-2023-2453

больше 2 лет назад

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-jhqc-77ch-jg99

больше 2 лет назад

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-05217

больше 2 лет назад

Уязвимость компонента require_once CMS-системы PHP-Fusion, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-2453

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-jhqc-77ch-jg99

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-05217

Уязвимость компонента require_once CMS-системы PHP-Fusion, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу