Multiple relative path traversal vulnerabilities in the oneup/uploader-bundle before 1.9.3 and 2.1.5 allow remote attackers to upload, copy, and modify files on the filesystem (potentially leading to arbitrary code execution) via the (1) filename parameter to BlueimpController.php; the (2) dzchunkindex, (3) dzuuid, or (4) filename parameter to DropzoneController.php; the (5) qqpartindex, (6) qqfilename, or (7) qquuid parameter to FineUploaderController.php; the (8) x-file-id or (9) x-file-name parameter to MooUploadController.php; or the (10) name or (11) chunk parameter to PluploadController.php. This is fixed in versions 1.9.3 and 2.1.5.
References
Link | Resource |
---|---|
https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c | Patch Third Party Advisory |
https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp | Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Dec 2021, 13:39
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt - Exploit, Third Party Advisory |
Information
Published : 2020-02-05 14:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-5237
Mitre link : CVE-2020-5237
CVE.ORG link : CVE-2020-5237
JSON object : View
Products Affected
1up
- oneupuploaderbundle