Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code execution
References
Link | Resource |
---|---|
https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 | Exploit Third Party Advisory |
https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 - Exploit, Third Party Advisory |
Information
Published : 2021-07-06 20:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-22249
Mitre link : CVE-2020-22249
CVE.ORG link : CVE-2020-22249
JSON object : View
Products Affected
phplist
- phplist
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type