An issue was discovered in JABA XPress Online Shop through 2018-09-14. It contains an arbitrary file upload vulnerability in the picture-upload feature of ProductEdit.aspx. An authenticated attacker may bypass the frontend filename validation and upload an arbitrary file via FileUploader.aspx.cs in FileUploader.aspx by using empty w and h parameters. This file may contain arbitrary aspx code that may be executed by accessing /Jec/ProductImages/<number>/<filename>. Accessing the file once uploaded does not require authentication.
References
Link | Resource |
---|---|
http://cyber-crime.ru/cve/CVE-2018-17058.html | Third Party Advisory |
http://cyber-crime.ru/cve/CVE-2018-17058.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://cyber-crime.ru/cve/CVE-2018-17058.html - Third Party Advisory |
Information
Published : 2020-03-02 14:15
Updated : 2024-11-21 03:53
NVD link : CVE-2018-17058
Mitre link : CVE-2018-17058
CVE.ORG link : CVE-2018-17058
JSON object : View
Products Affected
jaba
- jaba_xpress
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type