CVE-2019-7216

An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
References
Link Resource
https://encodable.com/filechucker/changelog/ Release Notes Vendor Advisory
https://github.com/ekultek/cve-2019-7216 Exploit Third Party Advisory
https://encodable.com/filechucker/changelog/ Release Notes Vendor Advisory
https://github.com/ekultek/cve-2019-7216 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:encodable:filechucker:4.99e-free-e02:*:*:*:*:*:*:*
cpe:2.3:a:encodable:filechucker:5.09:*:*:*:*:*:*:*

History

21 Nov 2024, 04:47

Type Values Removed Values Added
References () https://encodable.com/filechucker/changelog/ - Release Notes, Vendor Advisory () https://encodable.com/filechucker/changelog/ - Release Notes, Vendor Advisory
References () https://github.com/ekultek/cve-2019-7216 - Exploit, Third Party Advisory () https://github.com/ekultek/cve-2019-7216 - Exploit, Third Party Advisory

Information

Published : 2019-01-31 09:29

Updated : 2024-11-21 04:47


NVD link : CVE-2019-7216

Mitre link : CVE-2019-7216

CVE.ORG link : CVE-2019-7216


JSON object : View

Products Affected

encodable

  • filechucker