Логотип exploitDog
bind:CVE-2019-8933
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-8933

Количество 2

Количество 2

nvd логотип

CVE-2019-8933

почти 7 лет назад

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.

CVSS3: 8.8
EPSS: Средний
github логотип

GHSA-q8pj-4gw6-2cfj

больше 3 лет назад

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-8933

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.

CVSS3: 8.8
24%
Средний
почти 7 лет назад
github логотип
GHSA-q8pj-4gw6-2cfj

In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.

CVSS3: 8.8
24%
Средний
больше 3 лет назад

Уязвимостей на страницу