Pear Admin Think through 2.1.2 has an arbitrary file upload vulnerability that allows attackers to execute arbitrary code remotely. A .php file can be uploaded via admin.php/index/upload because app/common/service/UploadService.php mishandles fileExt.
                
            References
                    | Link | Resource | 
|---|---|
| https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DI3T | Exploit Issue Tracking Third Party Advisory | 
| https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DI3T | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:01
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DI3T - Exploit, Issue Tracking, Third Party Advisory | 
23 Aug 2021, 15:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://gitee.com/pear-admin/Pear-Admin-Think/issues/I3DI3T - Exploit, Issue Tracking, Third Party Advisory | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 7.5
         v3 : 9.8  | 
| CPE | cpe:2.3:a:pearadmin:pearadmin_think:*:*:*:*:*:*:*:* | |
| CWE | CWE-434 | 
12 Aug 2021, 23:06
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-08-12 22:15
Updated : 2024-11-21 06:01
NVD link : CVE-2021-29377
Mitre link : CVE-2021-29377
CVE.ORG link : CVE-2021-29377
JSON object : View
Products Affected
                pearadmin
- pearadmin_think
 
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
