Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2023-46474 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: PMB v7.4.8 suffers from **Unrestricted File Upload** via `start_import.php`. <br>πŸ’₯ **Consequences**: Attackers execute **Arbitrary Code** and escalate privileges to full system control.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Unrestricted File Upload** vulnerability.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **PMB Services** (Document Management Tool). <br>πŸ“‰ **Versions**: Specifically **v7.4.8** (and potentially up to v7.5.3 based on PoC title). <br>🏒 **Vendor**: PMB Services Team.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Attackers gain **Remote Code Execution (RCE)**. <br>πŸ“‚ **Data**: Can access/modify any data the web server user can.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Auth Required**: **Yes**. The CVSS vector `PR:H` (Privileges Required: High) indicates attackers need **valid credentials** or high-level access to upload files to the admin path (`/pmb/admin/...`).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploit**: **Yes**. A PoC is available on GitHub (`Xn2/CVE-2023-46474`). <br>🌐 **Status**: Active exploitation is possible. CVSS Score **9.1** (Critical) confirms high exploitability.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Scan for `pmb/admin/convert/start_import.php` endpoint. <br>2. Check if file upload functionality exists without strict MIME/type validation. <br>3.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Patch**: The description implies the vulnerability exists in v7.4.8. <br>βœ… **Action**: Update to the latest secure version of PMB.…

Q9What if no patch? (Workaround)

🚧 **Workaround (No Patch)**: <br>1. **Disable** the `start_import.php` script or the import feature entirely. <br>2. **Restrict Access**: Block admin paths via WAF or Nginx/Apache config. <br>3.…

Q10Is it urgent? (Priority Suggestion)

⚠️ **Urgency**: **CRITICAL**. <br>πŸ”₯ **Priority**: Immediate action required. CVSS 9.1 + Public PoC = High risk. Even with auth requirement, compromised admin accounts make this an instant critical incident.