In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
References
Link | Resource |
---|---|
https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-04-16 12:15
Updated : 2020-04-22 12:19
NVD link : CVE-2020-11811
Mitre link : CVE-2020-11811
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
qdpm
- qdpm