{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-7159","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-28T14:39:02.258Z","datePublished":"2023-12-29T07:00:05.537Z","dateUpdated":"2024-08-02T08:50:08.272Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:30:50.274Z"},"title":"gopeak MasterLab User.php update unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"CWE-434 Unrestricted Upload"}]}],"affected":[{"vendor":"gopeak","product":"MasterLab","versions":[{"version":"3.3.0","status":"affected"},{"version":"3.3.1","status":"affected"},{"version":"3.3.2","status":"affected"},{"version":"3.3.3","status":"affected"},{"version":"3.3.4","status":"affected"},{"version":"3.3.5","status":"affected"},{"version":"3.3.6","status":"affected"},{"version":"3.3.7","status":"affected"},{"version":"3.3.8","status":"affected"},{"version":"3.3.9","status":"affected"},{"version":"3.3.10","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in gopeak MasterLab up to 3.3.10. It has been declared as critical. Affected by this vulnerability is the function add/update of the file app/ctrl/admin/User.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249181 was assigned to this vulnerability."},{"lang":"de","value":"In gopeak MasterLab bis 3.3.10 wurde eine kritische Schwachstelle ausgemacht. Das betrifft die Funktion add/update der Datei app/ctrl/admin/User.php. Durch das Beeinflussen des Arguments avatar mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-28T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-20T13:18:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"glzjin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.249181","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.249181","tags":["signature","permissions-required"]},{"url":"https://note.zhaoj.in/share/jNbywlXI46HV","tags":["broken-link","exploit"]},{"url":"https://note.zhaoj.in/share/FE79uijyqmG7","tags":["broken-link"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:50:08.272Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249181","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249181","tags":["signature","permissions-required","x_transferred"]},{"url":"https://note.zhaoj.in/share/jNbywlXI46HV","tags":["broken-link","exploit","x_transferred"]},{"url":"https://note.zhaoj.in/share/FE79uijyqmG7","tags":["broken-link","x_transferred"]}]}]}}