In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
References
Link | Resource |
---|---|
https://blog.csdn.net/qq_36093477/article/details/86681178 | Exploit Third Party Advisory |
https://blog.csdn.net/qq_36093477/article/details/86681178 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.csdn.net/qq_36093477/article/details/86681178 - Exploit, Third Party Advisory |
Information
Published : 2019-02-19 02:29
Updated : 2024-11-21 04:50
NVD link : CVE-2019-8933
Mitre link : CVE-2019-8933
CVE.ORG link : CVE-2019-8933
JSON object : View
Products Affected
dedecms
- dedecms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type