### [CVE-2020-11811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11811) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file. ### POC #### Reference - https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html - https://fatihhcelik.blogspot.com/2020/01/qdpm-web-based-project-management.html #### Github No PoCs found on GitHub currently.