{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4559","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-08-27T06:15:03.172Z","datePublished":"2023-08-27T22:31:06.420Z","dateUpdated":"2024-08-02T07:31:06.228Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-24T15:02:20.305Z"},"title":"Bettershop LaikeTui POST Request unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"Bettershop","product":"LaikeTui","versions":[{"version":"n/a","status":"affected"}],"modules":["POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in Bettershop LaikeTui. Affected by this issue is some unknown functionality of the file index.php?module=api&action=user&m=upload of the component POST Request Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-238160."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in Bettershop LaikeTui entdeckt. Davon betroffen ist unbekannter Code der Datei index.php?module=api&action=user&m=upload der Komponente POST Request Handler. Durch Beeinflussen mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-08-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-08-27T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-08-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-09-20T18:10:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"p1nk (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.238160","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.238160","tags":["signature"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:31:06.228Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.238160","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.238160","tags":["signature","x_transferred"]}]}]}}