CVE-2023-43323

mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink].
References
Link Resource
https://github.com/ahrixia/CVE-2023-43323 Exploit Third Party Advisory
https://github.com/ahrixia/CVE-2023-43323 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*

History

21 Nov 2024, 08:23

Type Values Removed Values Added
References () https://github.com/ahrixia/CVE-2023-43323 - Exploit, Third Party Advisory () https://github.com/ahrixia/CVE-2023-43323 - Exploit, Third Party Advisory

25 Sep 2024, 01:36

Type Values Removed Values Added
CWE CWE-15

29 Sep 2023, 19:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References (MISC) https://github.com/ahrixia/CVE-2023-43323 - (MISC) https://github.com/ahrixia/CVE-2023-43323 - Exploit, Third Party Advisory
CPE cpe:2.3:a:moosocial:moosocial:3.1.8:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Moosocial moosocial
Moosocial

28 Sep 2023, 20:29

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-28 20:15

Updated : 2024-11-21 08:23


NVD link : CVE-2023-43323

Mitre link : CVE-2023-43323

CVE.ORG link : CVE-2023-43323


JSON object : View

Products Affected

moosocial

  • moosocial
CWE
NVD-CWE-noinfo CWE-15

External Control of System or Configuration Setting