cve/2019/CVE-2019-8933.md

20 lines
982 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-8933](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8933)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
### POC
#### Reference
- https://blog.csdn.net/qq_36093477/article/details/86681178
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/J1ezds/Vulnerability-Wiki-page
2024-05-26 14:27:05 +02:00
- https://github.com/Threekiii/Awesome-POC
2025-09-29 21:09:30 +02:00
- https://github.com/XiaomingX/awesome-poc-for-red-team
2024-05-26 14:27:05 +02:00