### [CVE-2018-14570](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14570) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A file upload vulnerability in application/shop/controller/member.php in Niushop B2B2C Multi-business basic version V1.11 allows any remote member to upload a .php file to the web server via a profile avatar field, by using an image Content-Type (e.g., image/jpeg) with a modified filename and file content. This results in arbitrary code execution by requesting that .php file. ### POC #### Reference - https://github.com/GitHaaH/issue/blob/master/Niushop.md - https://github.com/GitHaaH/issue/blob/master/Niushop.md #### Github No PoCs found on GitHub currently.