Vulnerability Description
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Magnussolution | Magnusbilling | >= 6.0.0, <= 7.3.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Executi
- https://eldstal.se/advisories/230327-magnusbilling.htmlExploitMitigationThird Party Advisory
- https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2023-30258.md
- https://github.com/magnussolution/magnusbilling7/commit/ccff9f6370f530cc41ef7de2Patch
- http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Executi
- https://eldstal.se/advisories/230327-magnusbilling.htmlExploitMitigationThird Party Advisory
- https://github.com/magnussolution/magnusbilling7/commit/ccff9f6370f530cc41ef7de2Patch
FAQ
What is CVE-2023-30258?
CVE-2023-30258 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
How severe is CVE-2023-30258?
CVE-2023-30258 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-30258?
Check the references section above for vendor advisories and patch information. Affected products include: Magnussolution Magnusbilling.