cve/2017/CVE-2017-16798.md

18 lines
835 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-16798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16798)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In CMS Made Simple 2.2.3.1, the is_file_acceptable function in modules/FileManager/action.upload.php only blocks file extensions that begin or end with a "php" substring, which allows remote attackers to bypass intended access restrictions or trigger XSS via other extensions, as demonstrated by .phtml, .pht, .html, or .svg.
### POC
#### Reference
- https://github.com/bsmali4/cve/blob/master/CMS%20Made%20Simple%20UPLOAD%20FILE%20XSS.md
#### Github
- https://github.com/0xT11/CVE-POC