mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 18:27:17 +00:00
1.9 KiB
1.9 KiB
CVE-2019-11447
Description
An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
POC
Reference
- http://packetstormsecurity.com/files/159134/CuteNews-2.1.2-Remote-Code-Execution.html
- http://pentest.com.tr/exploits/CuteNews-2-1-2-Remote-Code-Execution-Metasploit.html
- https://www.exploit-db.com/exploits/46698/
Github
- https://github.com/0xConstant/CVE-2019-11447
- https://github.com/0xConstant/ExploitDevJourney
- https://github.com/0xT11/CVE-POC
- https://github.com/0xkasra/ExploitDevJourney
- https://github.com/404notf0und/CVE-Flow
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CRFSlick/CVE-2019-11447-POC
- https://github.com/ColdFusionX/CVE-2019-11447_CuteNews-AvatarUploadRCE
- https://github.com/Meowmycks/OSCPprep-Cute
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dinesh876/CVE-2019-11447-POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/iainr/CuteNewsRCE
- https://github.com/khuntor/CVE-2019-11447-EXP
- https://github.com/mt-code/CVE-2019-11447
- https://github.com/schumalc/cutenews2.1.2_rce
- https://github.com/substing/CVE-2019-11447_reverse_shell_upload
- https://github.com/thewhiteh4t/cve-2019-11447