Niushop B2B2C Multi-business basic version V1.11, can bypass the administrator to obtain the background upload interface, through parameter upload, bypass the getimagesize function, upload php file, getshell.
References
Link | Resource |
---|---|
https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md | Exploit Third Party Advisory |
https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bluecity/CMS/blob/master/niushop%20v1.1-upload/Niushop%20Multi-business%20V1.11-en.md - Exploit, Third Party Advisory |
Information
Published : 2020-09-30 18:15
Updated : 2024-11-21 05:09
NVD link : CVE-2020-19672
Mitre link : CVE-2020-19672
CVE.ORG link : CVE-2020-19672
JSON object : View
Products Affected
niushop
- niushop
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type