Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0870 Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
Github GHSA Github GHSA GHSA-6r86-2jm9-9mh4 File upload restriction bypass in Zenario CMS
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2024-08-03T03:28:43.235Z

Reserved: 2022-01-10T00:00:00

Link: CVE-2022-23043

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-24T15:15:28.403

Modified: 2024-11-21T06:47:52.353

Link: CVE-2022-23043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses