CVE-2019-8933

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:dedecms:dedecms:5.7:sp2:*:*:*:*:*:*

History

21 Nov 2024, 04:50

Type Values Removed Values Added
References () https://blog.csdn.net/qq_36093477/article/details/86681178 - Exploit, Third Party Advisory () https://blog.csdn.net/qq_36093477/article/details/86681178 - Exploit, Third Party Advisory

Information

Published : 2019-02-19 02:29

Updated : 2024-11-21 04:50


NVD link : CVE-2019-8933

Mitre link : CVE-2019-8933

CVE.ORG link : CVE-2019-8933


JSON object : View

Products Affected

dedecms

  • dedecms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type