Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-17575

Опубликовано: 14 окт. 2019
Источник: nvd
CVSS3: 7.2
CVSS2: 6.5
EPSS Низкий

Описание

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*
Версия до 1.4.0 (включая)

EPSS

Процентиль: 48%
0.00253
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-706

Связанные уязвимости

CVSS3: 7.2
github
больше 3 лет назад

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code.

EPSS

Процентиль: 48%
0.00253
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-706