Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-28xp-7793-gfx5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

DBHcms v1.2.0 has an Arbitrary file write vulnerability in dbhcms\mod\mod.editor.php $_POST['updatefile'] is filename and $_POST['tinymce_content'] is file content, there is no filter function for security. A remote authenticated admin user can exploit this vulnerability to get a webshell.

DBHcms v1.2.0 has an Arbitrary file write vulnerability in dbhcms\mod\mod.editor.php $_POST['updatefile'] is filename and $_POST['tinymce_content'] is file content, there is no filter function for security. A remote authenticated admin user can exploit this vulnerability to get a webshell.

EPSS

Процентиль: 73%
0.00795
Низкий

Связанные уязвимости

CVSS3: 7.2
nvd
около 5 лет назад

DBHcms v1.2.0 has an Arbitrary file write vulnerability in dbhcms\mod\mod.editor.php $_POST['updatefile'] is filename and $_POST['tinymce_content'] is file content, there is no filter function for security. A remote authenticated admin user can exploit this vulnerability to get a webshell.

EPSS

Процентиль: 73%
0.00795
Низкий