First published: Thu Sep 06 2018(Updated: )
LimeSurvey version 3.14.4 and earlier contains a directory traversal in file upload that allows upload of webshell vulnerability in file upload functionality that can result in remote code execution as authenticated user. This attack appear to be exploitable via An authenticated user can upload a specially crafted zip file to get remote code execution. This vulnerability appears to have been fixed in after commit 72a02ebaaf95a80e26127ee7ee2b123cccce05a7 / version 3.14.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Limesurvey Limesurvey | <=3.14.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for LimeSurvey is CVE-2018-1000659.
The severity of CVE-2018-1000659 is high, with a score of 8.8.
The vulnerability in LimeSurvey allows remote code execution by exploiting a directory traversal in file upload, which allows the upload of a webshell.
LimeSurvey version 3.14.4 and earlier are affected by CVE-2018-1000659.
Yes, a fix is available. Update to a version later than 3.14.4 of LimeSurvey.