ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
References
Link | Resource |
---|---|
http://incidentsecurity.com/atutor-2-2-4-backup-remote-command-execution/ | Exploit Third Party Advisory URL Repurposed |
http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html | |
https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File | Exploit Third Party Advisory |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://incidentsecurity.com/atutor-2-2-4-backup-remote-command-execution/ - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2019-05-17 22:29
Updated : 2024-02-14 01:17
NVD link : CVE-2019-12170
Mitre link : CVE-2019-12170
CVE.ORG link : CVE-2019-12170
JSON object : View
Products Affected
atutor
- atutor
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type