### [CVE-2019-7216](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7216) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php. ### POC #### Reference - https://github.com/ekultek/cve-2019-7216 - https://github.com/ekultek/cve-2019-7216 #### Github - https://github.com/0xT11/CVE-POC - https://github.com/Ekultek/CVE-2019-7216 - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/nomi-sec/PoC-in-GitHub