Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jm78-jvf9-4c96

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

EPSS

Процентиль: 77%
0.01059
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

nvd
около 19 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the upload filter and execute arbitrary code via filenames with double extensions such as ".php.en", ".php.1", and other allowed extensions that are not .txt. NOTE: this is only a vulnerability when the server allows script execution in the pub directory.

debian
около 19 лет назад

TWiki 01-Dec-2000 up to 4.0.3 allows remote attackers to bypass the up ...

EPSS

Процентиль: 77%
0.01059
Низкий