A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
References
Link | Resource |
---|---|
https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2018-08-03 12:29
Updated : 2018-10-10 08:04
NVD link : CVE-2018-14911
Mitre link : CVE-2018-14911
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
ukcms
- ukcms