serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.
References
Link | Resource |
---|---|
https://demo.ripstech.com/projects/serendipity_2.0.3 | Third Party Advisory |
https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ | Third Party Advisory |
Configurations
Information
Published : 2019-05-24 11:29
Updated : 2019-05-29 07:33
NVD link : CVE-2016-10752
Mitre link : CVE-2016-10752
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
s9y
- serendipity