CVE-2018-19196

An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
References
Link Resource
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md Exploit Third Party Advisory
https://www.patec.cn/newsshow.php?cid=24&id=136 Broken Link Third Party Advisory
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md Exploit Third Party Advisory
https://www.patec.cn/newsshow.php?cid=24&id=136 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:xiaocms:xiaocms:20141229:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md - Exploit, Third Party Advisory () https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md - Exploit, Third Party Advisory
References () https://www.patec.cn/newsshow.php?cid=24&id=136 - Broken Link, Third Party Advisory () https://www.patec.cn/newsshow.php?cid=24&id=136 - Broken Link, Third Party Advisory

Information

Published : 2018-11-12 05:29

Updated : 2024-11-21 03:57


NVD link : CVE-2018-19196

Mitre link : CVE-2018-19196

CVE.ORG link : CVE-2018-19196


JSON object : View

Products Affected

xiaocms

  • xiaocms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')