DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content).
References
Link | Resource |
---|---|
http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ | Exploit Third Party Advisory |
http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ - Exploit, Third Party Advisory |
Information
Published : 2019-02-16 22:29
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8362
Mitre link : CVE-2019-8362
CVE.ORG link : CVE-2019-8362
JSON object : View
Products Affected
dedecms
- dedecms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type