Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hv36-f2fr-5259

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Incomplete blacklist vulnerability in Open Journal Systems before 2.3.7 allows remote authenticated users with the Author Role permission to execute arbitrary code by uploading a file with an executable extension that is not ".php", then accessing it via a direct request to the file in submission/original/ in the associated article directory, as demonstrated using .pHp, .asp, and other extensions.

Incomplete blacklist vulnerability in Open Journal Systems before 2.3.7 allows remote authenticated users with the Author Role permission to execute arbitrary code by uploading a file with an executable extension that is not ".php", then accessing it via a direct request to the file in submission/original/ in the associated article directory, as demonstrated using .pHp, .asp, and other extensions.

EPSS

Процентиль: 89%
0.04458
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Incomplete blacklist vulnerability in Open Journal Systems before 2.3.7 allows remote authenticated users with the Author Role permission to execute arbitrary code by uploading a file with an executable extension that is not ".php", then accessing it via a direct request to the file in submission/original/ in the associated article directory, as demonstrated using .pHp, .asp, and other extensions.

nvd
больше 13 лет назад

Incomplete blacklist vulnerability in Open Journal Systems before 2.3.7 allows remote authenticated users with the Author Role permission to execute arbitrary code by uploading a file with an executable extension that is not ".php", then accessing it via a direct request to the file in submission/original/ in the associated article directory, as demonstrated using .pHp, .asp, and other extensions.

debian
больше 13 лет назад

Incomplete blacklist vulnerability in Open Journal Systems before 2.3. ...

EPSS

Процентиль: 89%
0.04458
Низкий