Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Codiad/Codiad/issues/1098 | Third Party Advisory |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-19423-Exploit | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://github.com/Codiad/Codiad/issues/1098 | Third Party Advisory |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-19423-Exploit | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162772/Codiad-2.8.4-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/Codiad/Codiad/issues/1098 - Third Party Advisory | |
References | () https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-19423-Exploit - Exploit, Third Party Advisory |
Information
Published : 2018-11-21 21:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19423
Mitre link : CVE-2018-19423
CVE.ORG link : CVE-2018-19423
JSON object : View
Products Affected
codiad
- codiad
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type