serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.
References
Link | Resource |
---|---|
https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ | Third Party Advisory |
https://demo.ripstech.com/projects/serendipity_2.0.3 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-05-24 18:29
Updated : 2024-02-28 17:08
NVD link : CVE-2016-10752
Mitre link : CVE-2016-10752
CVE.ORG link : CVE-2016-10752
JSON object : View
Products Affected
s9y
- serendipity
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type