zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI. NOTE: The vendor's position is "We have no dynamic including. No one can run PHP by uploading an image in current version." It also requires authentication
References
Link | Resource |
---|---|
https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell | Broken Link Third Party Advisory |
https://github.com/zblogcn/zblogphp/issues/205 | Third Party Advisory |
Configurations
History
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
Summary | zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI. NOTE: The vendor's position is "We have no dynamic including. No one can run PHP by uploading an image in current version." It also requires authentication |
Information
Published : 2018-11-22 21:29
Updated : 2024-08-05 12:15
NVD link : CVE-2018-19463
Mitre link : CVE-2018-19463
CVE.ORG link : CVE-2018-19463
JSON object : View
Products Affected
zblogcn
- z-blogphp
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')