{ "id": "CVE-2023-28699", "sourceIdentifier": "twcert@cert.org.tw", "published": "2023-06-02T11:15:10.297", "lastModified": "2023-06-09T18:14:12.563", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service." }, { "lang": "es", "value": "Wade Graphic Design FANTSY tiene una vulnerabilidad de filtrado insuficiente para el tipo de archivo en su funci\u00f3n de actualizaci\u00f3n de archivos. Un atacante remoto autenticado con privilegios generales de usuario puede explotar esta vulnerabilidad para cargar un archivo PHP que contenga una webshell para realizar operaciones arbitrarias en el sistema o interrumpir el servicio. " } ], "metrics": { "cvssMetricV31": [ { "source": "twcert@cert.org.tw", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "twcert@cert.org.tw", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-434" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:wddgroup:fantasy:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "BB562D4D-8198-4A9A-A892-E1ADCAB017EA" } ] } ] } ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html", "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ] } ] }