First published: Sat May 27 2023(Updated: )
A vulnerability was found in JIZHICMS 2.4.5. It has been classified as critical. Affected is the function index of the file TemplateController.php. The manipulation of the argument webapi leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230082 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jizhicms Jizhicms | =2.4.5 | |
=2.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2927 is classified as critical.
CVE-2023-2927 affects the function index of the file TemplateController.php in JIZHICMS 2.4.5.
CVE-2023-2927 allows for server-side request forgery, enabling remote attackers to launch attacks.
CVE-2023-2927 can be exploited remotely by manipulating the argument webapi.
There is currently no known fix available for CVE-2023-2927. It is recommended to follow any vendor advisories or updates.