CVE-2023-45878

Scores

EPSS

0.925high92.5%
0%20%40%60%80%100%

Percentile: 92.5%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-787

Exploits

Exploit ID: CVE-2023-45878

Source: github-poc

URL: https://github.com/Can0I0Ever0Enter/CVE-2023-45878

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: gibbon

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:*",      "versionEndIncluding": "25.0.01",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list