Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fv76-64ff-h2vm

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.

eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.

EPSS

Процентиль: 96%
0.26432
Средний

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.

EPSS

Процентиль: 96%
0.26432
Средний