Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 Mitigation Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-23T00:00:00

Updated: 2022-06-24T15:00:33

Reserved: 2022-06-16T00:00:00


Link: CVE-2022-2102

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-06-24T15:15:10.450

Modified: 2022-07-06T12:46:45.807


Link: CVE-2022-2102

JSON object: View

cve-icon Redhat Information

No data.