Vulnerability Description
m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blog Project | Blog | < 1.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-ExecutioExploitThird Party AdvisoryVDB Entry
- https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2efPatchThird Party Advisory
- https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4Third Party Advisory
- http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-ExecutioExploitThird Party AdvisoryVDB Entry
- https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2efPatchThird Party Advisory
- https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4Third Party Advisory
FAQ
What is CVE-2022-23626?
CVE-2022-23626 is a vulnerability with a CVSS score of 8.5 (HIGH). m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload func...
How severe is CVE-2022-23626?
CVE-2022-23626 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23626?
Check the references section above for vendor advisories and patch information. Affected products include: Blog Project Blog.