Vulnerability Description
UliCMS 2023.1-sniffing-vicuna contains a remote code execution vulnerability that allows authenticated attackers to upload PHP files with .phar extension during profile avatar upload. Attackers can trigger code execution by visiting the uploaded file's location, enabling system command execution through maliciously crafted avatar uploads.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ulicms | Ulicms | 2023.1 |
Related Weaknesses (CWE)
References
- https://web.archive.org/web/20230314183734/https://en.ulicms.de/Product
- https://www.exploit-db.com/exploits/51434Exploit
- https://www.vulncheck.com/advisories/ulicms-sniffing-vicuna-remote-code-executioThird Party Advisory
- https://www.exploit-db.com/exploits/51434Exploit
FAQ
What is CVE-2023-53924?
CVE-2023-53924 is a vulnerability with a CVSS score of 8.8 (HIGH). UliCMS 2023.1-sniffing-vicuna contains a remote code execution vulnerability that allows authenticated attackers to upload PHP files with .phar extension during profile avatar upload. Attackers can tr...
How severe is CVE-2023-53924?
CVE-2023-53924 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53924?
Check the references section above for vendor advisories and patch information. Affected products include: Ulicms Ulicms.