An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.patec.cn/newsshow.php?cid=24&id=136 | Broken Link Third Party Advisory | 
| https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md | Exploit Third Party Advisory | 
Configurations
                    Information
                Published : 2018-11-11 21:29
Updated : 2018-12-13 10:14
NVD link : CVE-2018-19196
Mitre link : CVE-2018-19196
JSON object : View
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
Products Affected
                xiaocms
- xiaocms
 


