CVE-2023-43648 – baserproject/basercms
Package
Manager: composer
Name: baserproject/basercms
Vulnerable Version: >=0 <4.8.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00263 pctl0.49516
Details
baserCMS Directory Traversal vulnerability in Form submission data management Feature There is a Directory Traversal Vulnerability in Form submission data management Feature to baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.7.8 and earlier versions ### Vulnerability There is a possibility that information on the server may be obtained by a user who is logged in to the management screen. ### Countermeasures Update to the latest version of baserCMS Please refer to the following page to reference for more information. https://basercms.net/security/JVN_45547161 ### Credits Shiga Takuma@BroadBand Security, Inc
Metadata
Created: 2023-10-26T20:47:57Z
Modified: 2023-10-26T20:47:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-hmqj-gv2m-hq55/GHSA-hmqj-gv2m-hq55.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-hmqj-gv2m-hq55
Finding: F063
Auto approve: 1