14 Oct 2019
Vulnérabilité CVE-2019-17575 CVE Vulnerability
A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code. (CVSS:0.0) (Last Update:2019-10-14)
Vulnerability Details : A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code. Publish Date : 2019-10-14 Last Update Date : 2019-10-14 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2019-17575
- References For CVE-2019-17575
| ||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2019-17575There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |