CVE-2018-17826

HisiPHP 1.0.8 allows CSRF via admin.php/admin/user/adduser.html to add an administrator account. The attacker can then use that account to execute arbitrary PHP code by leveraging app/common/model/AdminAnnex.php to add .php to the default list of allowable file-upload types (.jpg, .png, .gif, .jpeg, and .ico).
References
Link Resource
https://github.com/rakjong/vuln/blob/master/hisiphp_getshell.pdf Exploit Technical Description Third Party Advisory
https://github.com/rakjong/vuln/blob/master/hisiphp_getshell.pdf Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hisiphp:hisiphp:1.0.8:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () https://github.com/rakjong/vuln/blob/master/hisiphp_getshell.pdf - Exploit, Technical Description, Third Party Advisory () https://github.com/rakjong/vuln/blob/master/hisiphp_getshell.pdf - Exploit, Technical Description, Third Party Advisory

Information

Published : 2018-10-01 08:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-17826

Mitre link : CVE-2018-17826

CVE.ORG link : CVE-2018-17826


JSON object : View

Products Affected

hisiphp

  • hisiphp
CWE
CWE-352

Cross-Site Request Forgery (CSRF)