Vulnerability Description
A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Flusity | Flusity | <= 2.304 |
Related Weaknesses (CWE)
References
- https://github.com/flusity/flusity-CMS/issues/4ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.243643Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.243643Third Party AdvisoryVDB Entry
- https://github.com/flusity/flusity-CMS/issues/4ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.243643Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.243643Third Party AdvisoryVDB Entry
FAQ
What is CVE-2023-5812?
CVE-2023-5812 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the arg...
How severe is CVE-2023-5812?
CVE-2023-5812 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5812?
Check the references section above for vendor advisories and patch information. Affected products include: Flusity Flusity.