{"api_version":"1","generated_at":"2026-04-21T10:22:55+00:00","cve":"CVE-2023-1185","urls":{"html":"https://cve.report/CVE-2023-1185","api":"https://cve.report/api/cve/CVE-2023-1185.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1185","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1185"},"summary":{"title":"CVE-2023-1185","description":"A vulnerability, which was classified as problematic, was found in ECshop up to 4.1.8. This affects an unknown part of the component New Product Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222357 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-03-06 08:15:00","updated_at":"2023-11-07 04:02:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.222357","name":"https://vuldb.com/?ctiid.222357","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"429","archivestatus":"404"},{"url":"https://github.com/wjzdalao/ecshop4.1.8/issues/2","name":"https://github.com/wjzdalao/ecshop4.1.8/issues/2","refsource":"MISC","tags":[],"title":"ecshop v4.1.8 file upload vulnerability · Issue #2 · wjzdalao/ecshop4.1.8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.222357","name":"https://vuldb.com/?id.222357","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"429","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1185","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1185","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1185","vulnerable":"1","versionEndIncluding":"4.1.8","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"shopex","cpe5":"ecshop","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1185","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, was found in ECshop up to 4.1.8. This affects an unknown part of the component New Product Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222357 was assigned to this vulnerability."},{"lang":"deu","value":"Es wurde eine problematische Schwachstelle in ECshop bis 4.1.8 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Komponente New Product Handler. Durch die Manipulation mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload","cweId":"CWE-434"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"ECshop","version":{"version_data":[{"version_affected":"=","version_value":"4.1.0"},{"version_affected":"=","version_value":"4.1.1"},{"version_affected":"=","version_value":"4.1.2"},{"version_affected":"=","version_value":"4.1.3"},{"version_affected":"=","version_value":"4.1.4"},{"version_affected":"=","version_value":"4.1.5"},{"version_affected":"=","version_value":"4.1.6"},{"version_affected":"=","version_value":"4.1.7"},{"version_affected":"=","version_value":"4.1.8"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.222357","refsource":"MISC","name":"https://vuldb.com/?id.222357"},{"url":"https://vuldb.com/?ctiid.222357","refsource":"MISC","name":"https://vuldb.com/?ctiid.222357"},{"url":"https://github.com/wjzdalao/ecshop4.1.8/issues/2","refsource":"MISC","name":"https://github.com/wjzdalao/ecshop4.1.8/issues/2"}]},"credits":[{"lang":"en","value":"OreoZe (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}]}},"nvd":{"publishedDate":"2023-03-06 08:15:00","lastModifiedDate":"2023-11-07 04:02:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:shopex:ecshop:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}