LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remote low-privileged user can upload an executable PHP file and execute system commands. The vulnerability is in the message function, and is due to insufficient validation of the file (such as shell.jpg.php.shell) being sent.
References
Link | Resource |
---|---|
https://github.com/Toxich4/CVE-2023-33253 | Exploit Third Party Advisory |
https://labcollector.com/ | Product |
https://labcollector.com/changelog-labcollector/ | Release Notes |
https://github.com/Toxich4/CVE-2023-33253 | Exploit Third Party Advisory |
https://labcollector.com/ | Product |
https://labcollector.com/changelog-labcollector/ | Release Notes |
Configurations
History
No history.
Information
Published : 2023-06-12 13:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33253
Mitre link : CVE-2023-33253
CVE.ORG link : CVE-2023-33253
JSON object : View
Products Affected
agilebio
- labcollector
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type