Simple Art Gallery 1.0 adminHome.php sliderPicSubmit unrestricted upload

A vulnerability was found in Simple Art Gallery 1.0. It has been declared as critical. This vulnerability affects the function sliderPicSubmit of the file adminHome.php. The manipulation leads to unrestricted upload. Using CWE to declare the problem leads to CWE-434. The weakness was released 03/15/2023. The advisory is available at github.com. This vulnerability was named CVE-2023-1415. The attack can be initiated remotely. Technical details are available. There is no exploit available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1608.002 by the MITRE ATT&CK project. It is declared as not defined. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

142

Field

vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2
software_name2
vulnerability_cvss3_cna_basescore1
vulnerability_cvss3_nvd_basescore1

Commit Conf

90%30
70%25
50%12
100%1

Approve Conf

90%30
70%25
80%12
100%1
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1393312004/08/2023VulD...cvss3_cna_basescore6.3see CVSS documentation04/08/2023accepted
90
1393311904/08/2023VulD...cvss3_nvd_basescore8.8nist.gov04/08/2023accepted
90
1393311804/08/2023VulD...cvss2_nvd_basescore6.5nist.gov04/08/2023accepted
90
1393311704/08/2023VulD...cvss3_meta_tempscore7.1see CVSS documentation04/08/2023accepted
90
1393311604/08/2023VulD...cvss3_meta_basescore7.1see CVSS documentation04/08/2023accepted
90
1393311504/08/2023VulD...cve_cnaVulDBnvd.nist.gov04/08/2023accepted
70
1393311404/08/2023VulD...cvss3_cna_aLnvd.nist.gov04/08/2023accepted
70
1393311304/08/2023VulD...cvss3_cna_iLnvd.nist.gov04/08/2023accepted
70
1393311204/08/2023VulD...cvss3_cna_cLnvd.nist.gov04/08/2023accepted
70
1393311104/08/2023VulD...cvss3_cna_sUnvd.nist.gov04/08/2023accepted
70
1393311004/08/2023VulD...cvss3_cna_uiNnvd.nist.gov04/08/2023accepted
70
1393310904/08/2023VulD...cvss3_cna_prLnvd.nist.gov04/08/2023accepted
70
1393310804/08/2023VulD...cvss3_cna_acLnvd.nist.gov04/08/2023accepted
70
1393310704/08/2023VulD...cvss3_cna_avNnvd.nist.gov04/08/2023accepted
70
1393310604/08/2023VulD...cvss2_nvd_aiPnvd.nist.gov04/08/2023accepted
70
1393310504/08/2023VulD...cvss2_nvd_iiPnvd.nist.gov04/08/2023accepted
70
1393310404/08/2023VulD...cvss2_nvd_ciPnvd.nist.gov04/08/2023accepted
70
1393310304/08/2023VulD...cvss2_nvd_auSnvd.nist.gov04/08/2023accepted
70
1393310204/08/2023VulD...cvss2_nvd_acLnvd.nist.gov04/08/2023accepted
70
1393310104/08/2023VulD...cvss2_nvd_avNnvd.nist.gov04/08/2023accepted
70

48 more entries are not shown

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!