A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/yxcmf/ukcms/issues/1 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T03:54:20.980Z
Reserved: 2018-08-03T00:00:00Z
Link: CVE-2018-14911

No data.

Status : Modified
Published: 2018-08-03T19:29:00.607
Modified: 2024-11-21T03:50:04.360
Link: CVE-2018-14911

No data.

No data.