CVE-2023-50692

File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory.
References
Link Resource
https://github.com/Cherry-toto/jizhicms/issues/91 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:jizhicms:jizhicms:2.5:*:*:*:*:*:*:*

History

04 Jan 2024, 20:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Jizhicms
Jizhicms jizhicms
CPE cpe:2.3:a:jizhicms:jizhicms:2.5:*:*:*:*:*:*:*
References () https://github.com/Cherry-toto/jizhicms/issues/91 - () https://github.com/Cherry-toto/jizhicms/issues/91 - Exploit, Issue Tracking
CWE CWE-434

28 Dec 2023, 15:09

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de carga de archivos en JIZHICMS v.2.5, permite a un atacante remoto ejecutar código arbitrario a través de un archivo manipulado cargado y descargado en el parámetro download_url en el directorio app/admin/exts/.

28 Dec 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-28 06:15

Updated : 2024-01-04 20:25


NVD link : CVE-2023-50692

Mitre link : CVE-2023-50692

CVE.ORG link : CVE-2023-50692


JSON object : View

Products Affected

jizhicms

  • jizhicms
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type