ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
References
Link | Resource |
---|---|
https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File | Exploit Third Party Advisory |
http://incidentsecurity.com/atutor-2-2-4-backup-remote-command-execution/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html |
Configurations
Information
Published : 2019-05-17 15:29
Updated : 2019-08-05 16:15
NVD link : CVE-2019-12170
Mitre link : CVE-2019-12170
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
atutor
- atutor