First published: Wed Jan 02 2019(Updated: )
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rukovoditel Rukovoditel | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this file-upload vulnerability in Rukovoditel 2.3.1 is CVE-2018-20166.
The severity of CVE-2018-20166 is high with a severity score of 8.8.
The vulnerability in Rukovoditel 2.3.1 occurs due to a file-upload flaw in the index.php?module=configuration/save endpoint, which mishandles extension checking.
The Rukovoditel 2.3.1 version is affected by CVE-2018-20166.
The Rukovoditel 2.3.1 file-upload vulnerability can be exploited by uploading a file with PHP content that appears to have GIF data at the beginning and a filename ending in ".php" (with mixed case).