i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a ".zip" file because a ZIP archive is accepted by /admin/?req=modules&action=add as a plugin, and extracted to the main directory. In order for the ".zip" file to be accepted, it must also contain a package.json file.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-12-15T05:00:00Z

Updated: 2024-09-16T20:11:52.699Z

Reserved: 2018-12-14T00:00:00Z

Link: CVE-2018-20159

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2018-12-15T05:29:00.797

Modified: 2019-01-07T13:46:55.257

Link: CVE-2018-20159

cve-icon Redhat

No data.