An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.
References
Link | Resource |
---|---|
https://github.com/TCSWT/Baby-Care-System/blob/main/README.md | Exploit Third Party Advisory |
https://github.com/TCSWT/Baby-Care-System/blob/main/README.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TCSWT/Baby-Care-System/blob/main/README.md - Exploit, Third Party Advisory |
Information
Published : 2021-02-17 15:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25780
Mitre link : CVE-2021-25780
CVE.ORG link : CVE-2021-25780
JSON object : View
Products Affected
baby_care_system_project
- baby_care_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type