First published: Tue Sep 05 2023(Updated: )
There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.
Credit: disclosure@synopsys.com disclosure@synopsys.com
Affected Software | Affected Version | How to fix |
---|---|---|
Php-fusion Phpfusion | <=9.10.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2453 is high with a CVSS score of 8.8.
The vulnerability CVE-2023-2453 occurs due to insufficient sanitization of tainted file names that are directly concatenated with a path.
The impact of CVE-2023-2453 is the inclusion and execution of arbitrary files with the '.php' extension whose absolute path is known.
Php-fusion version up to and including 9.10.30 is affected by CVE-2023-2453.
To mitigate the vulnerability CVE-2023-2453, ensure proper sanitization of file names and avoid directly concatenating tainted file names with a path that is subsequently passed to a 'require_once' statement.