Description
An arbitrary file upload vulnerability in the avatar upload function of vaeThink v1.0.1 allows attackers to open a webshell via changing uploaded file suffixes to ".php".
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-11207 | An arbitrary file upload vulnerability in the avatar upload function of vaeThink v1.0.1 allows attackers to open a webshell via changing uploaded file suffixes to ".php". |
References
| Link | Providers |
|---|---|
| https://github.com/tingyuu/vaeThink/issues/2 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:08:30.788Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-19302
No data.
Status : Modified
Published: 2021-08-03T22:15:08.970
Modified: 2024-11-21T05:09:07.470
Link: CVE-2020-19302
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD