{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5812","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-10-26T18:14:01.706Z","datePublished":"2023-10-27T01:31:05.296Z","dateUpdated":"2024-08-02T08:14:24.284Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-27T01:31:05.296Z"},"title":"flusity CMS upload.php handleFileUpload unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"flusity","product":"CMS","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643."},{"lang":"de","value":"In flusity CMS wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion handleFileUpload der Datei core/tools/upload.php. Durch Manipulation des Arguments uploaded_file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-10-26T20:19:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zihe (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.243643","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.243643","tags":["signature","permissions-required"]},{"url":"https://github.com/flusity/flusity-CMS/issues/4","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-28T18:21:03.799202Z","id":"CVE-2023-5812","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-28T18:21:10.751Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:14:24.284Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.243643","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.243643","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/flusity/flusity-CMS/issues/4","tags":["exploit","issue-tracking","x_transferred"]}]}]}}