First published: Fri Mar 01 2024(Updated: )
A local file inclusion (LFI) in Customer Support System v1 allows attackers to include internal PHP files and gain unauthorized acces via manipulation of the page= parameter at /customer_support/index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Customer Support System | ||
Customer Support System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49544 is classified as a high severity vulnerability due to its potential for unauthorized access through local file inclusion.
To fix CVE-2023-49544, validate and sanitize the 'page' parameter input to prevent unauthorized file inclusion.
Exploiting CVE-2023-49544 can allow attackers to access sensitive internal PHP files, potentially compromising the entire application.
CVE-2023-49544 affects version 1 of the Customer Support System.
To mitigate risks associated with CVE-2023-49544, implement strict input validation and employ proper error handling to avoid file inclusion vulnerabilities.