CVE-2019-8362

DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*
cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*
cpe:2.3:a:dedecms:dedecms:5.7:sp1:*:*:*:*:*:*
cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*

History

21 Nov 2024, 04:49

Type Values Removed Values Added
References () http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ - Exploit, Third Party Advisory () http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ - Exploit, Third Party Advisory

Information

Published : 2019-02-16 22:29

Updated : 2024-11-21 04:49


NVD link : CVE-2019-8362

Mitre link : CVE-2019-8362

CVE.ORG link : CVE-2019-8362


JSON object : View

Products Affected

dedecms

  • dedecms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type