There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.
References
Link | Resource |
---|---|
https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/ | Third Party Advisory |
https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:58
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-05 15:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2453
Mitre link : CVE-2023-2453
CVE.ORG link : CVE-2023-2453
JSON object : View
Products Affected
php-fusion
- phpfusion
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere