Description
An arbitrary file upload vulnerability in the Template Upload function of Maccms10 allows attackers bypass the suffix whitelist verification to execute arbitrary code via adding a character to the end of the uploaded file's name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-14131 | An arbitrary file upload vulnerability in the Template Upload function of Maccms10 allows attackers bypass the suffix whitelist verification to execute arbitrary code via adding a character to the end of the uploaded file's name. |
References
| Link | Providers |
|---|---|
| https://github.com/magicblack/maccms10/issues/80 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:30:31.995Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-21359
No data.
Status : Modified
Published: 2021-08-11T21:15:07.873
Modified: 2024-11-21T05:12:32.427
Link: CVE-2020-21359
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD