A web-accessible backdoor, with resultant SSRF, exists in Tp-shop 2.0.5 through 2.0.8, which allows remote attackers to obtain sensitive information, attack intranet hosts, or possibly trigger remote command execution, because /vendor/phpdocumentor/reflection-docblock/tests/phpDocumentor/Reflection/DocBlock/Tag/LinkTagTeet.php writes data from the "down_url" URL into the "bddlj" local file if the attacker knows the backdoor "jmmy" parameter.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/May/11 | Exploit Mailing List Mitigation Third Party Advisory |
http://seclists.org/fulldisclosure/2018/May/11 | Exploit Mailing List Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/May/11 - Exploit, Mailing List, Mitigation, Third Party Advisory |
Information
Published : 2018-05-02 21:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9919
Mitre link : CVE-2018-9919
CVE.ORG link : CVE-2018-9919
JSON object : View
Products Affected
tp-shop
- tp-shop
CWE
CWE-918
Server-Side Request Forgery (SSRF)