A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory | 
| https://github.com/yxcmf/ukcms/issues/1 | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/yxcmf/ukcms/issues/1 - Exploit, Issue Tracking, Third Party Advisory | 
Information
                Published : 2018-08-03 19:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-14911
Mitre link : CVE-2018-14911
CVE.ORG link : CVE-2018-14911
JSON object : View
Products Affected
                ukcms
- ukcms
 
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
