First published: Thu Sep 06 2018(Updated: )
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Limesurvey Limesurvey | <3.14.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1000658 is high with a severity value of 8.8.
The vulnerability in LimeSurvey version prior to 3.14.4 allows an attacker to gain code execution via webshell by uploading a zip archive containing malicious PHP files.
An attacker can exploit CVE-2018-1000658 by uploading a zip archive containing malicious PHP files.
Yes, authentication is required for an attacker to exploit the vulnerability in LimeSurvey version prior to 3.14.4.
Yes, updating to LimeSurvey version 3.14.4 or later fixes the vulnerability.