{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2738","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-05-16T14:32:59.091Z","datePublished":"2023-05-16T15:00:04.971Z","dateUpdated":"2024-08-02T06:33:05.530Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T06:23:22.266Z"},"title":"Tongda OA GatewayController.php actionGetdata unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"Tongda","product":"OA","versions":[{"version":"11.10","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Tongda OA 11.10. This affects the function actionGetdata of the file GatewayController.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Tongda OA 11.10 entdeckt. Sie wurde als kritisch eingestuft. Betroffen hiervon ist die Funktion actionGetdata der Datei GatewayController.php. Durch Manipulieren mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-05-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-05-16T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-05-16T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-09T14:25:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"RCEraser (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.229149","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.229149","tags":["signature","permissions-required"]},{"url":"https://github.com/RCEraser/cve/blob/main/tongda.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:33:05.530Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.229149","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.229149","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/RCEraser/cve/blob/main/tongda.md","tags":["exploit","x_transferred"]}]}]}}