vendor:
Froxlor
by:
Askar
8.8
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: Froxlor
Affected Version From: 2.0.3
Affected Version To: 2.0.3
Patch Exists: YES
Related CWE: CVE-2023-0315
CPE: a:froxlor:froxlor:2.0.3
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=81243, https://www.infosecmatter.com/nessus-plugin-library/?id=81208, https://www.infosecmatter.com/nessus-plugin-library/?id=151664, https://www.infosecmatter.com/nessus-plugin-library/?id=81225, https://www.infosecmatter.com/nessus-plugin-library/?id=53764, https://www.infosecmatter.com/nessus-plugin-library/?id=145565, https://www.infosecmatter.com/nessus-plugin-library/?id=146240, https://www.infosecmatter.com/nessus-plugin-library/?id=145699, https://www.infosecmatter.com/nessus-plugin-library/?id=147107, https://www.infosecmatter.com/nessus-plugin-library/?id=145196
Platforms Tested: Ubuntu 20.04, PHP 8.2
2023
Froxlor 2.0.3 Stable – Remote Code Execution (RCE)
Froxlor 2.0.3 Stable is vulnerable to Remote Code Execution (RCE). An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable endpoint. This payload will be executed on the server and can be used to gain access to the server. The vulnerability is due to the lack of proper input validation and authentication.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to update to the latest version of Froxlor.