Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-174-03 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2022-06-24T15:00:33.724581Z
Updated: 2024-09-16T21:56:57.012Z
Reserved: 2022-06-16T00:00:00
Link: CVE-2022-2102
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-06-24T15:15:10.450
Modified: 2024-11-21T07:00:19.347
Link: CVE-2022-2102
Redhat
No data.