Vulnerability Description
A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Otcms | Otcms | <= 6.62 |
Related Weaknesses (CWE)
References
- https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20toExploit
- https://vuldb.com/?ctiid.231512Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.231512Third Party Advisory
- https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20toExploit
- https://vuldb.com/?ctiid.231512Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.231512Third Party Advisory
FAQ
What is CVE-2023-3241?
CVE-2023-3241 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of th...
How severe is CVE-2023-3241?
CVE-2023-3241 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-3241?
Check the references section above for vendor advisories and patch information. Affected products include: Otcms Otcms.