CVE-2018-11345

An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:asustor:as6202t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:asustor:as6202t:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:43

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2018/May/2 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2018/May/2 - Mailing List, Third Party Advisory
References () https://github.com/mefulton/asustorexploit - Exploit, Third Party Advisory () https://github.com/mefulton/asustorexploit - Exploit, Third Party Advisory
References () https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation - Exploit, Third Party Advisory () https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation - Exploit, Third Party Advisory

Information

Published : 2018-05-22 01:29

Updated : 2024-11-21 03:43


NVD link : CVE-2018-11345

Mitre link : CVE-2018-11345

CVE.ORG link : CVE-2018-11345


JSON object : View

Products Affected

asustor

  • as6202t_firmware
  • as6202t
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type