An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
References
Link | Resource |
---|---|
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md | Exploit Third Party Advisory |
https://www.patec.cn/newsshow.php?cid=24&id=136 | Broken Link Third Party Advisory |
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md | Exploit Third Party Advisory |
https://www.patec.cn/newsshow.php?cid=24&id=136 | Broken Link Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md - Exploit, Third Party Advisory | |
References | () https://www.patec.cn/newsshow.php?cid=24&id=136 - Broken Link, Third Party Advisory |
Information
Published : 2018-11-12 05:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19196
Mitre link : CVE-2018-19196
CVE.ORG link : CVE-2018-19196
JSON object : View
Products Affected
xiaocms
- xiaocms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')