{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0783","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-02-11T17:03:27.134Z","datePublished":"2023-02-11T17:04:42.144Z","dateUpdated":"2024-08-02T05:24:34.435Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T20:59:19.814Z"},"title":"EcShop PHP File template.php unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"n/a","product":"EcShop","versions":[{"version":"4.1.5","status":"affected"}],"modules":["PHP File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in EcShop 4.1.5 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /ecshop/admin/template.php der Komponente PHP File Handler. Durch die Manipulation mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-02-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-02-11T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-02-11T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-03-10T09:21:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wjp911 (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.220641","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.220641","tags":["signature","permissions-required"]},{"url":"https://github.com/jingping911/exshopbug/blob/main/README.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:24:34.435Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.220641","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.220641","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jingping911/exshopbug/blob/main/README.md","tags":["exploit","x_transferred"]}]}]}}