An issue was discovered in ATutor through 2.2.4. It allows the user to run commands on the server with the teacher user privilege. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. The $IllegalExtensions value only lists lowercase (and thus .phP is a bypass), and omits .shtml and .phtml.
References
Link | Resource |
---|---|
http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46691/ | Exploit Third Party Advisory VDB Entry |
http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46691/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46691/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-04-22 11:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11446
Mitre link : CVE-2019-11446
CVE.ORG link : CVE-2019-11446
JSON object : View
Products Affected
atutor
- atutor
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type