{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7026","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-20T17:50:52.833Z","datePublished":"2023-12-21T04:31:04.033Z","dateUpdated":"2024-11-21T14:19:54.714Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-21T04:31:04.033Z"},"title":"Lightxun IPTV Gateway web_upload_template.html unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"Lightxun","product":"IPTV Gateway","versions":[{"version":"20231208","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Lightxun IPTV Gateway up to 20231208. It has been rated as problematic. This issue affects some unknown processing of the file /ZHGXTV/index.php/admin/index/web_upload_template.html. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248579."},{"lang":"de","value":"Eine Schwachstelle wurde in Lightxun IPTV Gateway bis 20231208 ausgemacht. Sie wurde als problematisch eingestuft. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /ZHGXTV/index.php/admin/index/web_upload_template.html. Dank Manipulation des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-12-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-20T18:56:01.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"willchen (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.248579","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.248579","tags":["signature","permissions-required"]},{"url":"https://github.com/willchen0011/cve/blob/main/upload2.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:08.198Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248579","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248579","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/willchen0011/cve/blob/main/upload2.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-10T20:15:38.729439Z","id":"CVE-2023-7026","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-21T14:19:54.714Z"}}]}}