serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.
References
Link | Resource |
---|---|
https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ | Third Party Advisory |
https://demo.ripstech.com/projects/serendipity_2.0.3 | Third Party Advisory |
https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ | Third Party Advisory |
https://demo.ripstech.com/projects/serendipity_2.0.3 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.ripstech.com/2016/serendipity-from-file-upload-to-code-execution/ - Third Party Advisory | |
References | () https://demo.ripstech.com/projects/serendipity_2.0.3 - Third Party Advisory |
Information
Published : 2019-05-24 18:29
Updated : 2024-11-21 02:44
NVD link : CVE-2016-10752
Mitre link : CVE-2016-10752
CVE.ORG link : CVE-2016-10752
JSON object : View
Products Affected
s9y
- serendipity
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type