cvelist/2016/10xxx/CVE-2016-10751.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2019-05-24 18:00:49 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-10751",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://demo.ripstech.com/projects/osclass_3.6.1",
"refsource": "MISC",
"name": "https://demo.ripstech.com/projects/osclass_3.6.1"
},
{
"url": "https://blog.ripstech.com/2016/osclass-remote-code-execution-via-image-file/",
"refsource": "MISC",
"name": "https://blog.ripstech.com/2016/osclass-remote-code-execution-via-image-file/"
}
]
}
}