File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory.
References
Link | Resource |
---|---|
https://github.com/Cherry-toto/jizhicms/issues/91 | Exploit Issue Tracking |
https://github.com/Cherry-toto/jizhicms/issues/91 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 08:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Cherry-toto/jizhicms/issues/91 - Exploit, Issue Tracking |
04 Jan 2024, 20:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 | |
References | () https://github.com/Cherry-toto/jizhicms/issues/91 - Exploit, Issue Tracking | |
First Time |
Jizhicms
Jizhicms jizhicms |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:jizhicms:jizhicms:2.5:*:*:*:*:*:*:* |
28 Dec 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-28 06:15
Updated : 2024-11-21 08:37
NVD link : CVE-2023-50692
Mitre link : CVE-2023-50692
CVE.ORG link : CVE-2023-50692
JSON object : View
Products Affected
jizhicms
- jizhicms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type