Vulnerability Description
An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed because exploitation requires that the attacker is able to enter requests as an admin; however, a ProcessWire admin is intentionally allowed to install any module that contains any arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Processwire | Processwire | 3.0.210 |
Related Weaknesses (CWE)
References
- https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccessExploitThird Party Advisory
- https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccessExploitThird Party Advisory
FAQ
What is CVE-2023-24676?
CVE-2023-24676 is a vulnerability with a CVSS score of 7.2 (HIGH). An issue found in ProcessWire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. NOTE: this is disputed bec...
How severe is CVE-2023-24676?
CVE-2023-24676 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24676?
Check the references section above for vendor advisories and patch information. Affected products include: Processwire Processwire.