Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxmx-23pw-wf2g

Опубликовано: 17 фев. 2022
Источник: github
Github: Не прошло ревью

Описание

Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.

Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.

EPSS

Процентиль: 85%
0.02427
Низкий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.

EPSS

Процентиль: 85%
0.02427
Низкий

Дефекты

CWE-434