ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.
References
Link | Resource |
---|---|
https://github.com/ClipperCMS/ClipperCMS/issues/494 | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/45839/ | Exploit Third Party Advisory VDB Entry |
https://github.com/ClipperCMS/ClipperCMS/issues/494 | Exploit Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/45839/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ClipperCMS/ClipperCMS/issues/494 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/45839/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-11-11 04:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19135
Mitre link : CVE-2018-19135
CVE.ORG link : CVE-2018-19135
JSON object : View
Products Affected
clippercms
- clippercms
CWE
CWE-352
Cross-Site Request Forgery (CSRF)