An issue was discovered in MinDoc through v1.0.2. It allows attackers to gain privileges by uploading an image file with contents that represent an admin session, and then sending a Cookie: header with a mindoc_id value containing the relative pathname of this uploaded file. For example, the mindoc_id (aka session ID) could be of the form aa/../../uploads/blog/201811/attach_#.jpg where '#' is a hex value displayed in the upload field of a manage/blogs/edit/ screen.
References
Link | Resource |
---|---|
https://github.com/lifei6671/mindoc/issues/384 | Issue Tracking Third Party Advisory |
https://github.com/lifei6671/mindoc/issues/384 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lifei6671/mindoc/issues/384 - Issue Tracking, Third Party Advisory |
Information
Published : 2018-11-08 18:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19114
Mitre link : CVE-2018-19114
CVE.ORG link : CVE-2018-19114
JSON object : View
Products Affected
iminho
- mindoc
CWE
CWE-20
Improper Input Validation