Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executable files, because upload_action and edit_action in Admin_SmileysController do not check the file extension. This leads to remote code execution with the privileges of the www-data user. The fixed versions are 5.3.4, 5.2.6, 5.1.7, and 5.0.9.
References
| Link | Resource |
|---|---|
| https://gitlab.studip.de/studip/studip/-/tags | Product |
| https://rehmeinfosec.de/labor/cve-2023-50982 | Exploit Third Party Advisory |
| https://sourceforge.net/projects/studip/files/Stud.IP/5.4/ | Product |
| https://gitlab.studip.de/studip/studip/-/tags | Product |
| https://rehmeinfosec.de/labor/cve-2023-50982 | Exploit Third Party Advisory |
| https://sourceforge.net/projects/studip/files/Stud.IP/5.4/ | Product |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gitlab.studip.de/studip/studip/-/tags - Product | |
| References | () https://rehmeinfosec.de/labor/cve-2023-50982 - Exploit, Third Party Advisory | |
| References | () https://sourceforge.net/projects/studip/files/Stud.IP/5.4/ - Product |
12 Jan 2024, 16:28
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-79 CWE-434 |
|
| References | () https://gitlab.studip.de/studip/studip/-/tags - Product | |
| References | () https://rehmeinfosec.de/labor/cve-2023-50982 - Exploit, Third Party Advisory | |
| References | () https://sourceforge.net/projects/studip/files/Stud.IP/5.4/ - Product | |
| CPE | cpe:2.3:a:studip:stud.ip:*:*:*:*:*:*:*:* | |
| First Time |
Studip stud.ip
Studip |
09 Jan 2024, 14:01
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
08 Jan 2024, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-08 20:15
Updated : 2025-06-03 15:15
NVD link : CVE-2023-50982
Mitre link : CVE-2023-50982
CVE.ORG link : CVE-2023-50982
JSON object : View
Products Affected
studip
- stud.ip
