An issue in Tecrail Responsive FileManager v9.9.5 and below allows attackers to bypass the file extension check mechanism and upload a crafted PHP file, leading to arbitrary code execution.
References
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html - | |
References | () https://github.com/trippo/ResponsiveFilemanager/blob/v9.9.5/filemanager/execute.php - Third Party Advisory | |
References | () https://github.com/trippo/ResponsiveFilemanager/blob/v9.9.6/changelog.txt - Release Notes, Third Party Advisory | |
References | () https://medium.com/%40_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7 - |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-02-02 13:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46604
Mitre link : CVE-2022-46604
CVE.ORG link : CVE-2022-46604
JSON object : View
Products Affected
tecrail
- responsive_filemanager
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type