An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
References
Link | Resource |
---|---|
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md | Exploit Third Party Advisory |
https://www.patec.cn/newsshow.php?cid=24&id=136 | Broken Link Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:21:56
Updated: 2022-10-03T16:21:56
Reserved: 2022-10-03T00:00:00
Link: CVE-2018-19196
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-11-12T05:29:00.417
Modified: 2018-12-13T18:14:48.063
Link: CVE-2018-19196
JSON object: View
Redhat Information
No data.
CWE