File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Cherry-toto/jizhicms/issues/91 | Exploit Issue Tracking | 
| https://github.com/Cherry-toto/jizhicms/issues/91 | Exploit Issue Tracking | 
Configurations
                    History
                    21 Nov 2024, 08:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Cherry-toto/jizhicms/issues/91 - Exploit, Issue Tracking | 
04 Jan 2024, 20:25
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:jizhicms:jizhicms:2.5:*:*:*:*:*:*:* | |
| References | () https://github.com/Cherry-toto/jizhicms/issues/91 - Exploit, Issue Tracking | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
| CWE | CWE-434 | 
28 Dec 2023, 15:09
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-12-28 06:15
Updated : 2025-04-17 21:15
NVD link : CVE-2023-50692
Mitre link : CVE-2023-50692
CVE.ORG link : CVE-2023-50692
JSON object : View
Products Affected
                jizhicms
- jizhicms
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
