In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
References
Link | Resource |
---|---|
https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory |
https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html - Exploit, Third Party Advisory |
Information
Published : 2020-04-16 19:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11811
Mitre link : CVE-2020-11811
CVE.ORG link : CVE-2020-11811
JSON object : View
Products Affected
qdpm
- qdpm
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type