{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1971","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-10T15:49:27.271Z","datePublished":"2023-04-10T16:31:03.094Z","dateUpdated":"2024-08-02T06:05:27.101Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:57:54.784Z"},"title":"yuan1994 tpAdmin Upload.php remote server-side request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-918","lang":"en","description":"CWE-918 Server-Side Request Forgery"}]}],"affected":[{"vendor":"yuan1994","product":"tpAdmin","versions":[{"version":"1.3.12","status":"affected"}]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\\admin\\controller\\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"Es wurde eine Schwachstelle in yuan1994 tpAdmin 1.3.12 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion remote der Datei application\\admin\\controller\\Upload.php. Durch das Manipulieren des Arguments url mit unbekannten Daten kann eine server-side request forgery-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-04-10T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-10T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-10T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-26T16:17:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nokali (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.225408","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.225408","tags":["signature","permissions-required"]},{"url":"https://tib36.github.io/2023/04/09/tpAdmin-SSRF/","tags":["broken-link","exploit"]}],"tags":["unsupported-when-assigned"]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:05:27.101Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.225408","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.225408","tags":["signature","permissions-required","x_transferred"]},{"url":"https://tib36.github.io/2023/04/09/tpAdmin-SSRF/","tags":["broken-link","exploit","x_transferred"]}]}]}}