CVE-2019-8933
19.02.2019, 02:29
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.Enginsight
Vendor | Product | Version |
---|---|---|
dedecms | dedecms | 5.7:sp2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration