Vulnerability Description
A vulnerability has been found in OTCMS up to 6.62 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file usersNews_deal.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231511.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Otcms | Otcms | <= 6.62 |
Related Weaknesses (CWE)
References
- https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20toExploit
- https://vuldb.com/?ctiid.231511Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.231511Third Party Advisory
- https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20toExploit
- https://vuldb.com/?ctiid.231511Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.231511Third Party Advisory
FAQ
What is CVE-2023-3240?
CVE-2023-3240 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability has been found in OTCMS up to 6.62 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file usersNews_deal.php. The manipulation of the arg...
How severe is CVE-2023-3240?
CVE-2023-3240 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3240?
Check the references section above for vendor advisories and patch information. Affected products include: Otcms Otcms.