In Bravo Tejari Procurement Portal, uploaded files are not properly validated by the application either on the client or the server side. An attacker can take advantage of this vulnerability and upload malicious executable files to compromise the application, as demonstrated by an esop/evm/OPPreliminaryForms.do?formId=857 request.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2018/Feb/38 | Mailing List Third Party Advisory |
https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html | Third Party Advisory VDB Entry |
http://seclists.org/bugtraq/2018/Feb/38 | Mailing List Third Party Advisory |
https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/bugtraq/2018/Feb/38 - Mailing List, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/146425/Tejari-Arbitrary-File-Upload.html - Third Party Advisory, VDB Entry |
Information
Published : 2018-02-18 06:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-7217
Mitre link : CVE-2018-7217
CVE.ORG link : CVE-2018-7217
JSON object : View
Products Affected
tejari
- bravo_solution
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type