Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2022-06-24T15:00:33.724581Z

Updated: 2024-09-16T21:56:57.012Z

Reserved: 2022-06-16T00:00:00

Link: CVE-2022-2102

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-06-24T15:15:10.450

Modified: 2022-07-06T12:46:45.807

Link: CVE-2022-2102

cve-icon Redhat

No data.