SourceCodester Student Study Center Desk Management System 1.0 POST Parameter Master.php path path traversal
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.9 | $0-$5k | 1.03 |
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown code block of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path
with the input value C%3A%2Ffoo.txt
leads to a path traversal vulnerability. CWE is classifying the issue as CWE-22. The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. This is going to have an impact on integrity, and availability.
The weakness was released 03/17/2023. This vulnerability is traded as CVE-2023-1467. Technical details and a public exploit are known. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 03/17/2023). This vulnerability is assigned to T1006 by the MITRE ATT&CK project.
It is declared as proof-of-concept.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Product
Vendor
Name
License
- free
CPE 2.3
CPE 2.2
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.5
VulDB Temp Score: 5.9
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
ATT&CK: T1006
Local: No
Remote: Yes
Availability: 🔒
Access: Public
Status: Proof-of-Concept
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔒
Timeline
03/17/2023 Advisory disclosed03/17/2023 VulDB entry created
03/17/2023 VulDB last update
Sources
Status: Not definedCVE: CVE-2023-1467 (🔒)
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 03/17/2023 12:49 PMChanges: 03/17/2023 12:49 PM (41)
Complete: 🔍
Submitter: WWesleywww
No comments yet. Languages: en.
Please log in to comment.