EasyAdmin8 2.0.2.2 File Upload Module index.html unrestricted upload

A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. Using CWE to declare the problem leads to CWE-434. The weakness was presented 07/20/2023. The advisory is shared for download at github.com. This vulnerability is traded as CVE-2023-3800. The attack can only be done within the local network. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1608.002. It is declared as proof-of-concept. The exploit is shared for download at github.com. As 0-day the estimated underground price was around $0-$5k. The vendor was contacted early about this disclosure but did not respond in any way. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Field07/20/2023 10:2308/15/2023 11:1508/15/2023 11:23
nameEasyAdmin8EasyAdmin8EasyAdmin8
version2.0.2.22.0.2.22.0.2.2
componentFile Upload ModuleFile Upload ModuleFile Upload Module
file/admin/index/index.html#/admin/mall.goods/index.html/admin/index/index.html#/admin/mall.goods/index.html/admin/index/index.html#/admin/mall.goods/index.html
cwe434 (unrestricted upload)434 (unrestricted upload)434 (unrestricted upload)
risk222
cvss3_vuldb_acHHH
cvss3_vuldb_prHHH
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/wolf-leo/EasyAdmin8/issues/1https://github.com/wolf-leo/EasyAdmin8/issues/1https://github.com/wolf-leo/EasyAdmin8/issues/1
availability111
publicity111
urlhttps://github.com/wolf-leo/EasyAdmin8/issues/1https://github.com/wolf-leo/EasyAdmin8/issues/1https://github.com/wolf-leo/EasyAdmin8/issues/1
cveCVE-2023-3800CVE-2023-3800CVE-2023-3800
responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
date1689804000 (07/20/2023)1689804000 (07/20/2023)1689804000 (07/20/2023)
cvss2_vuldb_acHHH
cvss2_vuldb_auMMM
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_avAAA
cvss2_vuldb_rlNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore3.73.73.7
cvss2_vuldb_tempscore3.23.23.2
cvss3_vuldb_basescore3.93.93.9
cvss3_vuldb_tempscore3.63.63.6
cvss3_meta_basescore3.93.94.8
cvss3_meta_tempscore3.63.64.7
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1689804000 (07/20/2023)1689804000 (07/20/2023)
cve_nvd_summaryA vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prH
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avA
cvss2_nvd_acH
cvss2_nvd_auM
cvss2_nvd_ciP
cvss2_nvd_iiP
cvss2_nvd_aiP
cvss3_cna_avA
cvss3_cna_acH
cvss3_cna_prH
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss2_nvd_basescore3.7
cvss3_nvd_basescore6.6
cvss3_cna_basescore3.9

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!