LimeSurvey version 3.14.4 and earlier contains a directory traversal in file upload that allows upload of webshell vulnerability in file upload functionality that can result in remote code execution as authenticated user. This attack appear to be exploitable via An authenticated user can upload a specially crafted zip file to get remote code execution. This vulnerability appears to have been fixed in after commit 72a02ebaaf95a80e26127ee7ee2b123cccce05a7 / version 3.14.4.
References
Link | Resource |
---|---|
https://github.com/LimeSurvey/LimeSurvey/commit/72a02ebaaf95a80e26127ee7ee2b123cccce05a7 | Patch Third Party Advisory |
https://github.com/LimeSurvey/LimeSurvey/commit/72a02ebaaf95a80e26127ee7ee2b123cccce05a7 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LimeSurvey/LimeSurvey/commit/72a02ebaaf95a80e26127ee7ee2b123cccce05a7 - Patch, Third Party Advisory |
Information
Published : 2018-09-06 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000659
Mitre link : CVE-2018-1000659
CVE.ORG link : CVE-2018-1000659
JSON object : View
Products Affected
limesurvey
- limesurvey
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')