{ "schema_version": "1.4.0", "id": "GHSA-mfvg-qwcw-qvc8", "modified": "2023-03-28T18:03:20Z", "published": "2023-03-23T20:00:10Z", "aliases": [ "CVE-2023-25655" ], "summary": "baserCMS allows any file to be uploaded", "details": "There is a vulnerability that allows uploading any files to baserCMS.\n\nThis is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.\nIf you are eligible, please update to the new version as soon as possible.\n\n### Target\nbaserCMS 4.7.3 and earlier versions\n\n### Vulnerability\nMalicious files may be uploaded in Upload File Management.\n\n### Countermeasures\nUpdate to the latest version of baserCMS\n\nPlease refer to the following page to reference for more information.\nhttps://basercms.net/security/JVN_61105618\n\n### Credits\n- Taisei Inoue@GMO Cybersecurity by Ierae, Inc.\n- Yusuke Akagi@Mitsui Bussan Secure Directions, Inc.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "Packagist", "name": "baserproject/basercms" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.7.5" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-mfvg-qwcw-qvc8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25655" }, { "type": "WEB", "url": "https://github.com/baserproject/basercms/commit/922025a98b0e697ab78f6a785a004e0729aa9100" }, { "type": "WEB", "url": "https://github.com/baserproject/basercms/commit/9297629983ed908c7f51bf61a0231dde91404ebd" }, { "type": "PACKAGE", "url": "https://github.com/baserproject/basercms" }, { "type": "WEB", "url": "https://github.com/baserproject/basercms/releases/tag/basercms-4.7.5" } ], "database_specific": { "cwe_ids": [ "CWE-434" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-03-23T20:00:10Z", "nvd_published_at": "2023-03-23T20:15:00Z" } }