cve/2018/CVE-2018-20166.md

19 lines
914 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-20166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20166)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
### POC
#### Reference
- https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-Authenticated-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/46011
#### Github
- https://github.com/ARPSyndicate/cvemon