Lucene search

K
githubGitHub Advisory DatabaseGHSA-FWVC-9XHJ-26V5
HistoryOct 26, 2022 - 12:00 p.m.

Badaso vulnerable to Remote Code Execution via malicious file upload

2022-10-2612:00:31
CWE-434
GitHub Advisory Database
github.com
12
badaso
remote code execution
malicious file upload
unauthenticated attacker
arbitrary code
server security

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.4%

Badaso allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.

Affected configurations

Vulners
Node
badasocoreRange<2.6.1
CPENameOperatorVersion
badaso/corelt2.6.1

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.4%

Related for GHSA-FWVC-9XHJ-26V5