Lucene search

K
githubGitHub Advisory DatabaseGHSA-582P-2FPG-X226
HistoryApr 05, 2023 - 6:30 p.m.

Microweber vulnerable to command injection

2023-04-0518:30:18
CWE-77
GitHub Advisory Database
github.com
8
microweber
command injection
server-side template

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

51.5%

microweber/microweber prior to 1.3.3 is vulnerable to command injection in the “first name” field. This allows for server-side template injection, which can lead to arbitrary code execution.

Affected configurations

Vulners
Node
microwebermicroweberRange<1.3.3
CPENameOperatorVersion
microweber/microweberlt1.3.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

51.5%

Related for GHSA-582P-2FPG-X226