A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
References
Link | Resource |
---|---|
https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory |
https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yxcmf/ukcms/issues/1 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2018-08-03 19:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-14911
Mitre link : CVE-2018-14911
CVE.ORG link : CVE-2018-14911
JSON object : View
Products Affected
ukcms
- ukcms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type