An issue was discovered in XiaoCms 20141229. It allows remote attackers to execute arbitrary code by using the type parameter to bypass the standard admin\controller\uploadfile.php restrictions on uploaded file types (jpg, jpeg, bmp, png, gif), as demonstrated by an admin/index.php?c=uploadfile&a=uploadify_upload&type=php URI.
References
Link Resource
https://github.com/AvaterXXX/XiaoCms/blob/master/GETSHELL.md Exploit Third Party Advisory
https://www.patec.cn/newsshow.php?cid=24&id=136 Broken Link Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:21:56

Updated: 2022-10-03T16:21:56

Reserved: 2022-10-03T00:00:00


Link: CVE-2018-19196

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-11-12T05:29:00.417

Modified: 2018-12-13T18:14:48.063


Link: CVE-2018-19196

JSON object: View

cve-icon Redhat Information

No data.

CWE