7.2
CVSSv3

CVE-2023-46818

CVSSv4: NA | CVSSv3: 7.2 | CVSSv2: NA | VMScore: 820 | EPSS: 0.80861 | KEV: Not Included
Published: 27/10/2023 Updated: 21/11/2024

Vulnerability Summary

PHP Code Injection Vulnerability in ISPConfig Below Version 3.2.11p1

A vulnerability was found in ISPConfig versions before 3.2.11p1. An admin could inject PHP code using the language file editor, but only if admin_allow_langedit is turned on.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ispconfig ispconfig

ispconfig ispconfig 3.2.11

Exploits

ISPConfig versions 4211 and below suffer from a PHP code injection vulnerability in language_editphp ...

Github Repositories

CVE-2023-46818 Python3 Exploit for ISPConfig <= 3.2.11 (language_edit.php) PHP Code Injection Vulnerability

CVE-2023-46818 Python Exploit 🔥 Description This Python exploit script targets a security vulnerability in ISPConfig's records POST parameter to /admin/language_editphp, which is not properly sanitized This allows an authenticated admin to inject and execute arbitrary PHP code ⚠️ Affected Versions Version 3211 and prior versions ⚙️ Usage python3 CVE-2023-4

This is my own exploit for CVE-2023-46818 happy hacking!

CVE-2023-46818-Exploit This is my own exploit for CVE-2023-46818 happy hacking! This exploit automates the attack described in CVE-2023-46818 by taking advantage of a PHP code injection vulnerability in ISPConfig version 3211 and earlier It logs into the ISPConfig panel using valid credentials, targets the vulnerable language_editphp file, and abuses the records[] form fiel

About me Hello, I am Lucas Marco, a Spanish Pentester and Cybersecurity Analyst I studied Software Engineering at university and it was during this time that I developed an interest in cybersecurity After that I worked as a developer and finally as a cybersecurity analyst, where I learned how to perform security audits, develop testing tools with different programming languag