Exploit
CVE-2023-4704

External Control of System or Configuration Setting (CWE-15)

Published: Sep 1, 2023 / Updated: 14mo ago

010
CVSS 4.9EPSS 0.04%Medium
CVE info copied to clipboard

External Control of System or Configuration Setting in GitHub repository instantsoft/icms2 prior to 2.16.1-git.

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2023-4704. See article

Sep 1, 2023 at 10:11 AM / cve.report
CVE Assignment

NVD published the first details for CVE-2023-4704

Sep 1, 2023 at 10:15 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 6.9%)

Sep 2, 2023 at 10:01 PM
Static CVE Timeline Graph

Affected Systems

Instantcms/instantcms
+null more

Exploits

https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a
+null more

Patches

github.com
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-13: Subverting Environment Variable Values
+null more

News

CVE-2023-4704 Exploit
CVE Id : CVE-2023-4704 Published Date: 2023-09-07T17:36:00+00:00 External Control of System or Configuration Setting in GitHub repository instantsoft/icms2 prior to 2.16.1-git. inTheWild added a link to an exploit: https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a
CVE-2023-4704
Critical Severity Description External Control of System or Configuration Setting in GitHub repository instantsoft/icms2 prior to 2.16.1-git. Read more at https://www.tenable.com/cve/CVE-2023-4704
NA - CVE-2023-4704 - External Control of System or Configuration...
External Control of System or Configuration Setting in GitHub repository instantsoft/icms2 prior to 2.16.1-git.
CVE-2023-4704 | instantsoft icms2 up to 2.16.0 unknown vulnerability
A vulnerability classified as critical has been found in instantsoft icms2 up to 2.16.0 . This affects an unknown part. The manipulation leads to external control of system or configuration setting. This vulnerability is uniquely identified as CVE-2023-4704 . It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
CVE-2023-4704
We have provided these links to other web sites because they By selecting these links, you will be leaving NIST webspace.
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:None
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI