CVE-2023-36319

File Upload vulnerability in Openupload Stable v.0.4.3 allows a remote attacker to execute arbitrary code via the action parameter of the compress-inc.php file.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:openupload_project:openupload:0.4.3:*:*:*:*:*:*:*

History

21 Nov 2024, 08:09

Type Values Removed Values Added
References () https://github.com/Lowalu/CVE-2023-36319 - Exploit, Third Party Advisory () https://github.com/Lowalu/CVE-2023-36319 - Exploit, Third Party Advisory
References () https://openupload.sourceforge.net/ - Product () https://openupload.sourceforge.net/ - Product

21 Sep 2023, 13:20

Type Values Removed Values Added
CPE cpe:2.3:a:openupload_project:openupload:0.4.3:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References (MISC) https://github.com/Lowalu/CVE-2023-36319 - (MISC) https://github.com/Lowalu/CVE-2023-36319 - Exploit, Third Party Advisory
References (MISC) https://openupload.sourceforge.net/ - (MISC) https://openupload.sourceforge.net/ - Product
CWE CWE-434
First Time Openupload Project
Openupload Project openupload

20 Sep 2023, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-20 00:15

Updated : 2024-11-21 08:09


NVD link : CVE-2023-36319

Mitre link : CVE-2023-36319

CVE.ORG link : CVE-2023-36319


JSON object : View

Products Affected

openupload_project

  • openupload
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type