CVE-2022-26521

Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
Configurations

Configuration 1 (hide)

cpe:2.3:a:abantecart:abantecart:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:54

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html -
References () https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txt - Exploit, Third Party Advisory () https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txt - Exploit, Third Party Advisory

Information

Published : 2022-03-10 17:47

Updated : 2024-11-21 06:54


NVD link : CVE-2022-26521

Mitre link : CVE-2022-26521

CVE.ORG link : CVE-2022-26521


JSON object : View

Products Affected

abantecart

  • abantecart
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type