Описание
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
Ссылки
- Exploit
- Exploit
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 15.1 (включая)
cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.79205
Высокий
6.8 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
github
больше 3 лет назад
The RdsLogsEntry servlet in SysAid Help Desk before 15.2 does not properly check file extensions, which allows remote attackers to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.
EPSS
Процентиль: 99%
0.79205
Высокий
6.8 Medium
CVSS2
Дефекты
CWE-22