Описание
Unrestricted file uploads in Contao
Impact
A back end user with access to the form generator can upload arbitrary files and execute them on the server.
Patches
Update to Contao 4.4.46 or 4.8.6.
Workarounds
Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory.
References
https://contao.org/en/security-advisories/unrestricted-file-uploads
For more information
If you have any questions or comments about this advisory, open an issue in contao/contao.
Ссылки
- https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p
- https://nvd.nist.gov/vuln/detail/CVE-2019-19745
- https://contao.org/en/news.html
- https://contao.org/en/security-advisories/unrestricted-file-uploads.html
- https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/contao/CVE-2019-19745.yaml
- https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml
Пакеты
contao/core-bundle
>= 4.0.0, < 4.4.46
4.4.46
contao/core-bundle
>= 4.5.0, < 4.8.6
4.8.6
contao/contao
>= 4.0.0, < 4.4.46
4.4.46
contao/contao
>= 4.5.0, < 4.8.6
4.8.6
Связанные уязвимости
Contao 4.0 through 4.8.5 allows PHP local file inclusion. A back end user with access to the form generator can upload arbitrary files and execute them on the server.