First published: Sat Sep 08 2018(Updated: )
CScms 4.1 allows arbitrary file upload by (for example) adding the php extension to the default filetype list (gif, jpg, png), and then providing a .php pathname within fileurl JSON data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chshcms Cscms | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16731 is a vulnerability in CScms 4.1 that allows arbitrary file upload by adding the php extension to the default filetype list.
CVE-2018-16731 works by manipulating the default filetype list and providing a .php pathname within fileurl JSON data during file upload.
CVE-2018-16731 has a severity level of 9.8 (Critical).
To fix CVE-2018-16731, update to a version of CScms that is not affected by the vulnerability.
Yes, you can find more information about CVE-2018-16731 in the references provided: [Reference 1](https://github.com/AvaterXXX/CScms/blob/master/CScms_up.md) and [Reference 2](https://www.patec.cn/newsshow.php?cid=24&id=123).