{"api_version":"1","generated_at":"2026-04-23T05:57:58+00:00","cve":"CVE-2023-4480","urls":{"html":"https://cve.report/CVE-2023-4480","api":"https://cve.report/api/cve/CVE-2023-4480.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-4480","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-4480"},"summary":{"title":"CVE-2023-4480","description":"Due to an out-of-date dependency in the “Fusion File Manager” component accessible through the admin panel, an attacker can send a crafted request that allows them to read the contents of files on the system accessible within the privileges of the running process. Additionally, they may write files to arbitrary locations, provided the files pass the application’s mime-type and file extension validation. ","state":"PUBLIC","assigner":"disclosure@synopsys.com","published_at":"2023-09-05 15:15:00","updated_at":"2023-09-08 17:26:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/","name":"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/","refsource":"MISC","tags":[],"title":"CyRC Vulnerability Advisory: CVE-2023-2453 Local File Inclusion in Forum Infusion and CVE-2023-4480 Arbitrary File Read in Fusion File Manager | Synopsys","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-4480","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4480","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"4480","vulnerable":"1","versionEndIncluding":"9.10.30","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php-fusion","cpe5":"phpfusion","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-4480","ASSIGNER":"disclosure@synopsys.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"\nDue to an out-of-date dependency in the “Fusion File Manager” component accessible through the admin panel, an attacker can send a crafted request that allows them to read the contents of files on the system accessible within the privileges of the running process. Additionally, they may write files to arbitrary locations, provided the files pass the application’s mime-type and file extension validation. \n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory","cweId":"CWE-538"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"PHPFusion","product":{"product_data":[{"product_name":"PHPFusion","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThanOrEqual":"9.10.30","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"affected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/","refsource":"MISC","name":"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"work_around":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Technologies such as a web application firewall may help to mitigate exploitation attempts.</span>\n\n<br>"}],"value":"\nTechnologies such as a web application firewall may help to mitigate exploitation attempts.\n\n\n"}],"credits":[{"lang":"en","value":"Dharani Sri Penumacha"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-05 15:15:00","lastModifiedDate":"2023-09-08 17:26:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":4.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php-fusion:phpfusion:*:*:*:*:*:*:*:*","versionEndIncluding":"9.10.30","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}