First published: Wed Sep 27 2023(Updated: )
An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
phpkobo AjaxNewsTicker | =1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41449 is critical with a CVSS score of 9.8.
A remote attacker can exploit CVE-2023-41449 by executing arbitrary code via a crafted payload to the 'reque' parameter.
The affected software for CVE-2023-41449 is phpkobo AjaxNewsTicker v.1.0.5.
To fix CVE-2023-41449, update to a version of phpkobo AjaxNewsTicker that is not vulnerable, if available. Alternatively, consider using a different plugin or implementing additional security measures.
You can find more information about CVE-2023-41449 on the official websites of AjaxNewsTicker (http://ajaxnewsticker.com) and phpkobo (http://phpkobo.com), as well as a demonstration of the vulnerability on a GitHub gist (https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0).