Lucene search

K
cve9119a7d8-5eab-497f-8521-727c672e3725CVE-2023-45197
HistoryJun 21, 2024 - 3:15 p.m.

CVE-2023-45197

2024-06-2115:15:15
CWE-434
CWE-22
9119a7d8-5eab-497f-8521-727c672e3725
web.nvd.nist.gov
25
file upload
adminerevo
root directory
table name
security issue
version 4.8.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/AU:Y

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

39.5%

The file upload plugin in Adminer and AdminerEvo allows an attacker to upload a file with a table name of “…” to the root of the Adminer directory. The attacker can effectively guess the name of the uploaded file and execute it. Adminer is no longer supported, but this issue was fixed in AdminerEvo version 4.8.3.

Affected configurations

NVD
Node
adminerevoadminerevoRange<4.8.3
CPENameOperatorVersion
adminerevo:adminerevoadminerevolt4.8.3

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:a:adminer:adminer:0:*:*:*:*:*:*:*",
      "cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:*"
    ],
    "defaultStatus": "unknown",
    "product": "Adminer",
    "vendor": "Adminer",
    "versions": [
      {
        "lessThanOrEqual": "*",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "cpe:2.3:a:adminer:adminer:*:*:*:*:*:*:*:*",
        "status": "affected",
        "version": "cpe:2.3:a:adminer:adminer:0:*:*:*:*:*:*:*",
        "versionType": "cpe"
      }
    ]
  },
  {
    "cpes": [
      "cpe:2.3:a:adminerevo:adminerevo:4.8.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:adminerevo:adminerevo:4.8.3:*:*:*:*:*:*:*"
    ],
    "defaultStatus": "unknown",
    "product": "AdminerEvo",
    "programFiles": [
      "plugins/file-upload.php"
    ],
    "repo": "https://github.com/adminerevo/adminerevo",
    "vendor": "AdminerEvo",
    "versions": [
      {
        "lessThan": "4.8.3",
        "status": "affected",
        "version": "4.8.2",
        "versionType": "custom"
      },
      {
        "lessThan": "cpe:2.3:a:adminerevo:adminerevo:4.8.3:*:*:*:*:*:*:*",
        "status": "affected",
        "version": "cpe:2.3:a:adminerevo:adminerevo:0:*:*:*:*:*:*:*",
        "versionType": "cpe"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:L/AU:Y

7.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

39.5%

Related for CVE-2023-45197