Vulnerability Description
File Upload vulnerability found in Monitorr v.1.7.6 allows a remote attacker t oexecute arbitrary code via a crafted file upload to the assets/php/upload.php endpoint.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Monitorr | Monitorr | 1.7.6m |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.
- https://github.com/Monitorr/Product
- https://github.com/Monitorr/MonitorrProduct
- https://github.com/Monitorr/Monitorr/blob/3ebfd915bfb02aae2ded08c5e4ba6b1bea3009Product
- https://twitter.com/retrymp3Third Party Advisory
- http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.
- https://github.com/Monitorr/Product
- https://github.com/Monitorr/MonitorrProduct
- https://github.com/Monitorr/Monitorr/blob/3ebfd915bfb02aae2ded08c5e4ba6b1bea3009Product
- https://twitter.com/retrymp3Third Party Advisory
FAQ
What is CVE-2023-26775?
CVE-2023-26775 is a vulnerability with a CVSS score of 7.8 (HIGH). File Upload vulnerability found in Monitorr v.1.7.6 allows a remote attacker t oexecute arbitrary code via a crafted file upload to the assets/php/upload.php endpoint.
How severe is CVE-2023-26775?
CVE-2023-26775 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26775?
Check the references section above for vendor advisories and patch information. Affected products include: Monitorr Monitorr.