/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162591/Subrion-CMS-4.2.1-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/173998/Intelliants-Subrion-CMS-4.2.1-Remote-Code-Execution.html | |
https://github.com/intelliants/subrion/issues/801 | Exploit Third Party Advisory |
Configurations
History
04 Aug 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 May 2021, 13:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/162591/Subrion-CMS-4.2.1-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-11-21 21:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-19422
Mitre link : CVE-2018-19422
CVE.ORG link : CVE-2018-19422
JSON object : View
Products Affected
intelliants
- subrion_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type