7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 High
AI Score
Confidence
High
2.7 Low
CVSS2
Access Vector
Access Complexity
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
31.2%
A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.
Vendor | Product | Version | CPE |
---|---|---|---|
otcms | otcms | 6.0 | cpe:2.3:a:otcms:otcms:6.0:*:*:*:*:*:*:* |
otcms | otcms | 6.1 | cpe:2.3:a:otcms:otcms:6.1:*:*:*:*:*:*:* |
otcms | otcms | 6.2 | cpe:2.3:a:otcms:otcms:6.2:*:*:*:*:*:*:* |
otcms | otcms | 6.3 | cpe:2.3:a:otcms:otcms:6.3:*:*:*:*:*:*:* |
otcms | otcms | 6.4 | cpe:2.3:a:otcms:otcms:6.4:*:*:*:*:*:*:* |
otcms | otcms | 6.5 | cpe:2.3:a:otcms:otcms:6.5:*:*:*:*:*:*:* |
otcms | otcms | 6.6 | cpe:2.3:a:otcms:otcms:6.6:*:*:*:*:*:*:* |
otcms | otcms | 6.7 | cpe:2.3:a:otcms:otcms:6.7:*:*:*:*:*:*:* |
otcms | otcms | 6.8 | cpe:2.3:a:otcms:otcms:6.8:*:*:*:*:*:*:* |
otcms | otcms | 6.9 | cpe:2.3:a:otcms:otcms:6.9:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "OTCMS",
"versions": [
{
"version": "6.0",
"status": "affected"
},
{
"version": "6.1",
"status": "affected"
},
{
"version": "6.2",
"status": "affected"
},
{
"version": "6.3",
"status": "affected"
},
{
"version": "6.4",
"status": "affected"
},
{
"version": "6.5",
"status": "affected"
},
{
"version": "6.6",
"status": "affected"
},
{
"version": "6.7",
"status": "affected"
},
{
"version": "6.8",
"status": "affected"
},
{
"version": "6.9",
"status": "affected"
},
{
"version": "6.10",
"status": "affected"
},
{
"version": "6.11",
"status": "affected"
},
{
"version": "6.12",
"status": "affected"
},
{
"version": "6.13",
"status": "affected"
},
{
"version": "6.14",
"status": "affected"
},
{
"version": "6.15",
"status": "affected"
},
{
"version": "6.16",
"status": "affected"
},
{
"version": "6.17",
"status": "affected"
},
{
"version": "6.18",
"status": "affected"
},
{
"version": "6.19",
"status": "affected"
},
{
"version": "6.20",
"status": "affected"
},
{
"version": "6.21",
"status": "affected"
},
{
"version": "6.22",
"status": "affected"
},
{
"version": "6.23",
"status": "affected"
},
{
"version": "6.24",
"status": "affected"
},
{
"version": "6.25",
"status": "affected"
},
{
"version": "6.26",
"status": "affected"
},
{
"version": "6.27",
"status": "affected"
},
{
"version": "6.28",
"status": "affected"
},
{
"version": "6.29",
"status": "affected"
},
{
"version": "6.30",
"status": "affected"
},
{
"version": "6.31",
"status": "affected"
},
{
"version": "6.32",
"status": "affected"
},
{
"version": "6.33",
"status": "affected"
},
{
"version": "6.34",
"status": "affected"
},
{
"version": "6.35",
"status": "affected"
},
{
"version": "6.36",
"status": "affected"
},
{
"version": "6.37",
"status": "affected"
},
{
"version": "6.38",
"status": "affected"
},
{
"version": "6.39",
"status": "affected"
},
{
"version": "6.40",
"status": "affected"
},
{
"version": "6.41",
"status": "affected"
},
{
"version": "6.42",
"status": "affected"
},
{
"version": "6.43",
"status": "affected"
},
{
"version": "6.44",
"status": "affected"
},
{
"version": "6.45",
"status": "affected"
},
{
"version": "6.46",
"status": "affected"
},
{
"version": "6.47",
"status": "affected"
},
{
"version": "6.48",
"status": "affected"
},
{
"version": "6.49",
"status": "affected"
},
{
"version": "6.50",
"status": "affected"
},
{
"version": "6.51",
"status": "affected"
},
{
"version": "6.52",
"status": "affected"
},
{
"version": "6.53",
"status": "affected"
},
{
"version": "6.54",
"status": "affected"
},
{
"version": "6.55",
"status": "affected"
},
{
"version": "6.56",
"status": "affected"
},
{
"version": "6.57",
"status": "affected"
},
{
"version": "6.58",
"status": "affected"
},
{
"version": "6.59",
"status": "affected"
},
{
"version": "6.60",
"status": "affected"
},
{
"version": "6.61",
"status": "affected"
},
{
"version": "6.62",
"status": "affected"
}
]
}
]
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 High
AI Score
Confidence
High
2.7 Low
CVSS2
Access Vector
Access Complexity
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
31.2%