In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
References
Link | Resource |
---|---|
https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-04-16 19:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-11811
Mitre link : CVE-2020-11811
CVE.ORG link : CVE-2020-11811
JSON object : View
Products Affected
qdpm
- qdpm
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type