Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html | |
https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txt | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-07T00:00:00
Updated: 2023-03-27T00:00:00
Reserved: 2022-03-07T00:00:00
Link: CVE-2022-26521
JSON object: View
NVD Information
Status : Modified
Published: 2022-03-10T17:47:46.260
Modified: 2023-03-27T18:15:10.977
Link: CVE-2022-26521
JSON object: View
Redhat Information
No data.
CWE