m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2ef | Patch Third Party Advisory |
https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4 | Third Party Advisory |
http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2ef | Patch Third Party Advisory |
https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.5 |
References | () http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2ef - Patch, Third Party Advisory | |
References | () https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4 - Third Party Advisory |
13 Jul 2023, 16:08
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
CWE | CWE-252 |
23 May 2022, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-20 |
11 Feb 2022, 17:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
CPE | cpe:2.3:a:blog_project:blog:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/m1k1o/blog/commit/6f5e59f1401c4a3cf2e518aa85b231ea14e8a2ef - Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/m1k1o/blog/security/advisories/GHSA-wmqj-5v54-24x4 - Third Party Advisory |
08 Feb 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue. |
08 Feb 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-08 22:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23626
Mitre link : CVE-2022-23626
CVE.ORG link : CVE-2022-23626
JSON object : View
Products Affected
blog_project
- blog