serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.
References
Link | Resource |
---|---|
https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ | Third Party Advisory |
https://demo.ripstech.com/projects/serendipity_2.0.3 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-24T17:40:22
Updated: 2019-05-24T17:40:22
Reserved: 2019-05-24T00:00:00
Link: CVE-2016-10752
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-24T18:29:00.300
Modified: 2019-05-29T14:33:40.747
Link: CVE-2016-10752
JSON object: View
Redhat Information
No data.
CWE