DBHcms v1.2.0 has an Arbitrary file write vulnerability in dbhcms\mod\mod.editor.php $_POST['updatefile'] is filename and $_POST['tinymce_content'] is file content, there is no filter function for security. A remote authenticated admin user can exploit this vulnerability to get a webshell.
References
Link Resource
https://github.com/fragrant10/cve/tree/master/dbhcms1.2.0#14 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-08-24T14:45:55

Updated: 2020-08-24T14:45:55

Reserved: 2020-08-13T00:00:00


Link: CVE-2020-19891

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-08-24T15:15:14.020

Modified: 2020-08-25T01:37:47.587


Link: CVE-2020-19891

JSON object: View

cve-icon Redhat Information

No data.

CWE