e107_web/js/plupload/upload.php in e107 2.1.8 allows remote attackers to execute arbitrary PHP code by uploading a .php filename with the image/jpeg content type.
References
Link | Resource |
---|---|
https://gist.github.com/ommadawn46/5cb22e7c66cc32a5c7734a8064b4d3f5 | Exploit Third Party Advisory |
https://github.com/e107inc/e107/commit/e5bb5297f68e56537c004cdbb48a30892e9f6f4c | Patch Third Party Advisory |
https://gist.github.com/ommadawn46/5cb22e7c66cc32a5c7734a8064b4d3f5 | Exploit Third Party Advisory |
https://github.com/e107inc/e107/commit/e5bb5297f68e56537c004cdbb48a30892e9f6f4c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/ommadawn46/5cb22e7c66cc32a5c7734a8064b4d3f5 - Exploit, Third Party Advisory | |
References | () https://github.com/e107inc/e107/commit/e5bb5297f68e56537c004cdbb48a30892e9f6f4c - Patch, Third Party Advisory |
Information
Published : 2018-09-12 16:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16388
Mitre link : CVE-2018-16388
CVE.ORG link : CVE-2018-16388
JSON object : View
Products Affected
e107
- e107
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type