CVE-2023-37897

CVSS 3.1 Score 8.8 of 10 (high)

Details

Published Jul 18, 2023
Updated: Jul 28, 2023
CWE ID 393
CWE ID 74

Summary

CVE-2023-37897 is a server-side template injection (SSTI) vulnerability in Grav, a file-based web platform built in PHP. This vulnerability affects Grav versions 1.7.42 and onwards. The issue arises due to an incorrect return value from the `isDangerousFunction()` check, allowing attackers to execute malicious code by prepending a double backslash. To exploit this vulnerability, the attacker needs access to either an Administrator account or a non-administrator user account with Admin panel access and Create/Update page permissions. A fix has been introduced in commit `b4c6210` and is included in release version `1.7.42.2`. It is recommended for users to upgrade as there are no known workarounds available. The vulnerability has a base severity score of 8.8 (High) according to NIST's CVSS v3.1 rating, with high impact on confidentiality, integrity, and availability of affected systems.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-37897 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions