An issue was discovered in Responsive Filemanager through 9.14.0. In the ajax_calls.php file in the save_img action in the name parameter, there is no validation of what kind of extension is sent. This makes it possible to execute PHP code if a legitimate JPEG image contains this code in the EXIF data, and the .php extension is used in the name parameter. (A potential fast patch is to disable the save_img action in the config file.)
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:06:09.539Z

Reserved: 2020-03-14T00:00:00

Link: CVE-2020-10567

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-14T14:15:11.310

Modified: 2024-11-21T04:55:35.863

Link: CVE-2020-10567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses