Vulnerability Description
There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php-Fusion | Phpfusion | <= 9.10.30 |
Related Weaknesses (CWE)
References
- https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cveThird Party Advisory
- https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cveThird Party Advisory
FAQ
What is CVE-2023-2453?
CVE-2023-2453 is a vulnerability with a CVSS score of 8.8 (HIGH). There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.ph...
How severe is CVE-2023-2453?
CVE-2023-2453 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-2453?
Check the references section above for vendor advisories and patch information. Affected products include: Php-Fusion Phpfusion.