{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7098","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-24T11:07:19.480Z","datePublished":"2023-12-25T02:00:05.851Z","dateUpdated":"2024-08-26T20:31:43.900Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:32:13.145Z"},"title":"icret EasyImages hide.php path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-24","lang":"en","description":"CWE-24 Path Traversal: '../filedir'"}]}],"affected":[{"vendor":"icret","product":"EasyImages","versions":[{"version":"2.8.3","status":"affected"}]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in icret EasyImages 2.8.3. This vulnerability affects unknown code of the file app/hide.php. The manipulation of the argument key leads to path traversal: '../filedir'. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-248950 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"de","value":"In icret EasyImages 2.8.3 wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei app/hide.php. Durch das Beeinflussen des Arguments key mit unbekannten Daten kann eine path traversal: '../filedir'-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.1,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.1,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.1,"vectorString":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-12-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-24T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-12-24T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-18T18:09:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"glzjin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.248950","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.248950","tags":["signature","permissions-required"]},{"url":"https://note.zhaoj.in/share/MHnV2WLY9rxU","tags":["broken-link","exploit"]}],"tags":["unsupported-when-assigned"]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:08.251Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248950","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248950","tags":["signature","permissions-required","x_transferred"]},{"url":"https://note.zhaoj.in/share/MHnV2WLY9rxU","tags":["broken-link","exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-26T20:31:35.952806Z","id":"CVE-2023-7098","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T20:31:43.900Z"}}]}}