An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
References
Link | Resource |
---|---|
https://www.patec.cn/newsshow.php?cid=24&id=136 | Broken Link Third Party Advisory |
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-11-11 21:29
Updated : 2018-12-13 10:14
NVD link : CVE-2018-19196
Mitre link : CVE-2018-19196
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
xiaocms
- xiaocms