CVE-2023-28699

Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wddgroup:fantasy:2.1.8:*:*:*:*:*:*:*

History

09 Jun 2023, 18:14

Type Values Removed Values Added
References (MISC) https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html - (MISC) https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html - Third Party Advisory
First Time Wddgroup
Wddgroup fantasy
CPE cpe:2.3:a:wddgroup:fantasy:2.1.8:*:*:*:*:*:*:*

02 Jun 2023, 12:48

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-02 11:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28699

Mitre link : CVE-2023-28699

CVE.ORG link : CVE-2023-28699


JSON object : View

Products Affected

wddgroup

  • fantasy
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type