An arbitrary file upload vulnerability in Jizhicms v1.5 allows attackers to execute arbitrary code via a crafted .jpg file which is later changed to a PHP file.
References
Link | Resource |
---|---|
https://www.porlockz.com/A-arbitrary-file-upload-vulnerability-in-jizhicms-v1-5/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-09-15T21:43:58
Updated: 2021-09-15T21:43:58
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-21483
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-15T22:15:10.200
Modified: 2021-09-28T15:49:12.857
Link: CVE-2020-21483
JSON object: View
Redhat Information
No data.
CWE