admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://www.objectplanet.com/opinio/changelog.html | Release Notes Vendor Advisory |
https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
https://www.objectplanet.com/opinio/changelog.html | Release Notes Vendor Advisory |
Configurations
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/163709/ObjectPlanet-Opinio-7.13-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.objectplanet.com/opinio/changelog.html - Release Notes, Vendor Advisory |
Information
Published : 2021-07-31 17:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-26806
Mitre link : CVE-2020-26806
CVE.ORG link : CVE-2020-26806
JSON object : View
Products Affected
objectplanet
- opinio
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')