An arbitrary file upload vulnerability in the Server Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary code via a crafted PHP file.
References
Link | Resource |
---|---|
https://shimo.im/docs/XKq4MKmDYDC8B1kN | Exploit Third Party Advisory |
https://shimo.im/docs/XKq4MKmDYDC8B1kN | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://shimo.im/docs/XKq4MKmDYDC8B1kN - Exploit, Third Party Advisory |
28 Nov 2022, 21:07
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://shimo.im/docs/XKq4MKmDYDC8B1kN - Exploit, Third Party Advisory | |
CWE | CWE-434 | |
CPE | cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
25 Nov 2022, 18:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-25 16:15
Updated : 2024-11-21 07:28
NVD link : CVE-2022-45039
Mitre link : CVE-2022-45039
CVE.ORG link : CVE-2022-45039
JSON object : View
Products Affected
wbce
- wbce_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type