Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5rv6-786c-qwh8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.

rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.

EPSS

Процентиль: 98%
0.58581
Средний

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.

EPSS

Процентиль: 98%
0.58581
Средний