uploadImage.php in ProjeQtOr before 6.3.2 allows remote authenticated users to execute arbitrary PHP code by uploading a .php file composed of concatenated image data and script data, as demonstrated by uploading as an image within the description text area.
References
Link | Resource |
---|---|
https://track.projeqtor.org/view/main.php?directAccess=true&objectClass=Ticket&objectId=2884 | Permissions Required |
https://track.projeqtor.org/view/main.php?directAccess=true&objectClass=Ticket&objectId=2884 | Permissions Required |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://track.projeqtor.org/view/main.php?directAccess=true&objectClass=Ticket&objectId=2884 - Permissions Required |
Information
Published : 2017-07-31 17:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11760
Mitre link : CVE-2017-11760
CVE.ORG link : CVE-2017-11760
JSON object : View
Products Affected
projeqtor
- projeqtor
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')