Skip to main content

CVE-2023-46474: n/a in n/a

High
VulnerabilityCVE-2023-46474cvecve-2023-46474
Published: Thu Jan 11 2024 (01/11/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

File Upload vulnerability PMB v.7.4.8 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted PHP file uploaded to the start_import.php file.

AI-Powered Analysis

AILast updated: 07/04/2025, 10:27:33 UTC

Technical Analysis

CVE-2023-46474 is a file upload vulnerability identified in PMB version 7.4.8, which allows a remote attacker to execute arbitrary code and escalate privileges by uploading a crafted PHP file via the start_import.php endpoint. This vulnerability falls under CWE-434, which pertains to unrestricted file upload flaws. The attacker can leverage this flaw to upload malicious PHP scripts that the server executes, leading to full compromise of the affected system. The CVSS 3.1 base score is 7.2 (high severity), reflecting the network attack vector (AV:N), low attack complexity (AC:L), but requiring high privileges (PR:H) and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to complete system takeover, data theft, and service disruption. Although the vendor and product details are not explicitly provided, the vulnerability is specifically tied to PMB 7.4.8, a software likely used for library management or similar functions. No known exploits are currently reported in the wild, and no patches or mitigation links are provided, suggesting that organizations using this software version remain at risk until a fix is released or alternative mitigations are applied.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for institutions relying on PMB 7.4.8 or similar versions, such as libraries, educational institutions, or cultural organizations that use PMB for resource management. Exploitation could lead to unauthorized access to sensitive data, including personal information of users or intellectual property. The ability to execute arbitrary code and escalate privileges means attackers could establish persistent backdoors, disrupt operations, or use compromised systems as pivot points for broader network attacks. Given the high confidentiality, integrity, and availability impact, organizations could face data breaches, regulatory penalties under GDPR, reputational damage, and operational downtime. The lack of patches increases the urgency for proactive mitigation. The requirement for high privileges to exploit may limit the attack surface to insiders or attackers who have already gained some level of access, but the absence of user interaction lowers barriers for automated exploitation once access is obtained.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the start_import.php endpoint to trusted administrators only, using network segmentation and firewall rules. 2. Implement strict file upload validation and filtering at the web application firewall (WAF) or reverse proxy level to block PHP or other executable files. 3. Monitor logs for unusual upload activity or execution of unexpected scripts. 4. Enforce the principle of least privilege for all users to minimize the risk of privilege escalation. 5. If possible, disable file upload functionality temporarily until a patch or vendor guidance is available. 6. Conduct regular security audits and penetration testing focused on file upload mechanisms. 7. Maintain up-to-date backups and ensure incident response plans are prepared for potential compromise. 8. Engage with the PMB vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-10-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6ebb

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/4/2025, 10:27:33 AM

Last updated: 7/26/2025, 10:34:51 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats