Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-06-23T00:00:00
Updated: 2022-06-24T15:00:33
Reserved: 2022-06-16T00:00:00
Link: CVE-2022-2102
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-06-24T15:15:10.450
Modified: 2022-07-06T12:46:45.807
Link: CVE-2022-2102
JSON object: View
Redhat Information
No data.