A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
References
Link | Resource |
---|---|
https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:22:28
Updated: 2022-10-03T16:22:28
Reserved: 2022-10-03T00:00:00
Link: CVE-2018-14911
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-03T19:29:00.607
Modified: 2018-10-10T15:04:45.703
Link: CVE-2018-14911
JSON object: View
Redhat Information
No data.
CWE