cve/2019/CVE-2019-12170.md
2024-06-22 09:37:59 +00:00

25 lines
1.2 KiB
Markdown

### [CVE-2019-12170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12170)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PHP files to be written to the web root, and for code to execute on the remote server.
### POC
#### Reference
- http://packetstormsecurity.com/files/153869/ATutor-2.2.4-Backup-Remote-Command-Execution.html
- https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit
- https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File
- https://github.com/hectorgie/PoC-in-GitHub