CVE-2023-23607

erohtar/Dasherr is a dashboard for self-hosted services. In affected versions unrestricted file upload allows any unauthenticated user to execute arbitrary code on the server. The file /www/include/filesave.php allows for any file to uploaded to anywhere. If an attacker uploads a php file they can execute code on the server. This issue has been addressed in version 1.05.00. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dasherr_project:dasherr:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:46

Type Values Removed Values Added
References
  • () https://www.vicarius.io/vsociety/posts/analyzing-arbitrary-file-upload-in-dasherr-cve-2023-23607-23608 -
References () https://github.com/erohtar/Dasherr/commit/445325c7cf1148a8cd38af3a90789c6cbf6c5112 - Patch, Third Party Advisory () https://github.com/erohtar/Dasherr/commit/445325c7cf1148a8cd38af3a90789c6cbf6c5112 - Patch, Third Party Advisory
References () https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq - Exploit, Third Party Advisory () https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq - Exploit, Third Party Advisory
Summary
  • (es) erohtar/Dasherr es un panel para servicios autohospedados. En las versiones afectadas, la carga de archivos sin restricciones permite que cualquier usuario no autenticado ejecute código arbitrario en el servidor. El archivo /www/include/filesave.php permite cargar cualquier archivo en cualquier lugar. Si un atacante carga un archivo php, puede ejecutar código en el servidor. Este problema se solucionó en la versión 1.05.00. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema.

Information

Published : 2023-01-20 21:15

Updated : 2024-11-21 07:46


NVD link : CVE-2023-23607

Mitre link : CVE-2023-23607

CVE.ORG link : CVE-2023-23607


JSON object : View

Products Affected

dasherr_project

  • dasherr
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type