Unrestricted file upload vulnerability in "op/op.UploadChunks.php" in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the "qqfile" parameter. This allows an authenticated attacker to upload a malicious file containing PHP code to execute operating system commands to the web root of the application.
References
Link | Resource |
---|---|
https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG | Third Party Advisory |
https://www.contextis.com/resources/advisories/cve-2018-12940 | Third Party Advisory |
https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG | Third Party Advisory |
https://www.contextis.com/resources/advisories/cve-2018-12940 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://sourceforge.net/p/seeddms/code/ci/seeddms-5.1.x/tree/CHANGELOG - Third Party Advisory | |
References | () https://www.contextis.com/resources/advisories/cve-2018-12940 - Third Party Advisory |
Information
Published : 2018-07-31 14:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12940
Mitre link : CVE-2018-12940
CVE.ORG link : CVE-2018-12940
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type