eLabFTW 1.8.5 is vulnerable to arbitrary file uploads via the /app/controllers/EntityController.php component. This may result in remote command execution. An attacker can use a user account to fully compromise the system using a POST request. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
References
| Link | Resource |
|---|---|
| http://incidentsecurity.com/elabftw-1-8-5-entitycontroller-arbitrary-file-upload-rce/ | Exploit Vendor Advisory URL Repurposed |
| https://github.com/fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE | Exploit Third Party Advisory |
| http://incidentsecurity.com/elabftw-1-8-5-entitycontroller-arbitrary-file-upload-rce/ | Exploit Vendor Advisory URL Repurposed |
| https://github.com/fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://incidentsecurity.com/elabftw-1-8-5-entitycontroller-arbitrary-file-upload-rce/ - Exploit, Vendor Advisory, URL Repurposed | |
| References | () https://github.com/fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE - Exploit, Third Party Advisory |
14 Feb 2024, 01:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://incidentsecurity.com/elabftw-1-8-5-entitycontroller-arbitrary-file-upload-rce/ - Exploit, Vendor Advisory, URL Repurposed |
Information
Published : 2019-05-20 00:29
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12185
Mitre link : CVE-2019-12185
CVE.ORG link : CVE-2019-12185
JSON object : View
Products Affected
elabftw
- elabftw
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
