PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension.
References
Link | Resource |
---|---|
https://gist.github.com/X1nda/749b6aac6e080624d9f8ec81321335df | Exploit Third Party Advisory |
https://gist.github.com/X1nda/749b6aac6e080624d9f8ec81321335df | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/X1nda/749b6aac6e080624d9f8ec81321335df - Exploit, Third Party Advisory |
Information
Published : 2017-04-07 04:59
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7570
Mitre link : CVE-2017-7570
CVE.ORG link : CVE-2017-7570
JSON object : View
Products Affected
pivotx
- pivotx
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')