In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
                
            References
                    | Link | Resource | 
|---|---|
| https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory | 
| https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html - Exploit, Third Party Advisory | 
Information
                Published : 2020-04-16 19:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11811
Mitre link : CVE-2020-11811
CVE.ORG link : CVE-2020-11811
JSON object : View
Products Affected
                qdpm
- qdpm
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
