Vulnerability Description
Unified Remote 3.13.0 allows remote attackers to execute arbitrary Lua code because of a wildcarded Access-Control-Allow-Origin for the Remote upload endpoint.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unifiedremote | Unified Remote | 3.13.0 |
Related Weaknesses (CWE)
References
- https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/Exploit
- https://www.exploit-db.com/exploits/51309ExploitThird Party AdvisoryVDB Entry
- https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/Exploit
- https://www.exploit-db.com/exploits/51309ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2023-52252?
CVE-2023-52252 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unified Remote 3.13.0 allows remote attackers to execute arbitrary Lua code because of a wildcarded Access-Control-Allow-Origin for the Remote upload endpoint.
How severe is CVE-2023-52252?
CVE-2023-52252 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-52252?
Check the references section above for vendor advisories and patch information. Affected products include: Unifiedremote Unified Remote.