cve/2018/CVE-2018-19135.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-19135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19135)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.
### POC
#### Reference
- https://github.com/ClipperCMS/ClipperCMS/issues/494
2024-06-09 00:33:16 +00:00
- https://github.com/ClipperCMS/ClipperCMS/issues/494
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/45839/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/45839/
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.