CVE-2023-7098
LOW
3,1
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
LOW
2,1
Source: [email protected]
Access Vector: network
Access Complexity: high
Authentication: single
Confidentiality: partial
Integrity: none
Availability: none
Description
AI Translation Available
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in icret EasyImages 2.8.3. This vulnerability affects unknown code of the file app/hide.php. The manipulation of the argument key leads to path traversal: '../filedir'. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-248950 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0014
Percentile
0,3th
Updated
EPSS Score Trend (Last 90 Days)
24
Path Traversal: '../filedir'
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Potential Impacts:
Read Files Or Directories
Modify Files Or Directories
Applicable Platforms
All platforms may be affected
Application
Easyimages2.0 by Easyimages2.0 Project
CPE Identifier
View Detailed Analysis
cpe:2.3:a:easyimages2.0_project:easyimages2.0:2.8.3:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://note.zhaoj.in/share/MHnV2WLY9rxU
https://vuldb.com/?ctiid.248950
https://vuldb.com/?id.248950
https://note.zhaoj.in/share/MHnV2WLY9rxU
https://vuldb.com/?ctiid.248950
https://vuldb.com/?id.248950