Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2023-04-10
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1379 ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Github GHSA Github GHSA GHSA-qr7h-8pv2-xvx2 yuan1994 tpAdmin vulnerable to Server-Side Request Forgery
History

No history.

Subscriptions

Tpadmin Project Tpadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-08-02T06:05:27.101Z

Reserved: 2023-04-10T15:49:27.271Z

Link: CVE-2023-1971

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-04-10T17:15:06.937

Modified: 2024-11-21T07:40:15.393

Link: CVE-2023-1971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses