An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.
References
Link | Resource |
---|---|
https://encodable.com/filechucker/changelog/ | Release Notes Vendor Advisory |
https://github.com/ekultek/cve-2019-7216 | Exploit Third Party Advisory |
https://encodable.com/filechucker/changelog/ | Release Notes Vendor Advisory |
https://github.com/ekultek/cve-2019-7216 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://encodable.com/filechucker/changelog/ - Release Notes, Vendor Advisory | |
References | () https://github.com/ekultek/cve-2019-7216 - Exploit, Third Party Advisory |
Information
Published : 2019-01-31 09:29
Updated : 2024-11-21 04:47
NVD link : CVE-2019-7216
Mitre link : CVE-2019-7216
CVE.ORG link : CVE-2019-7216
JSON object : View
Products Affected
encodable
- filechucker
CWE