inxedu through 2018-12-24 has a vulnerability that can lead to the upload of a malicious JSP file. The vulnerable code location is com.inxedu.os.common.controller.VideoUploadController#gok4 (com/inxedu/os/common/controller/VideoUploadController.java). The attacker uses the /video/uploadvideo fileType parameter to change the list of acceptable extensions from jpg,gif,png,jpeg to jpg,gif,png,jsp,jpeg.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://gitee.com/inxeduopen/inxedu/issues/IQJUH |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:54:28.317Z
Reserved: 2019-02-09T00:00:00
Link: CVE-2019-7684

No data.

Status : Modified
Published: 2019-02-09T22:29:00.713
Modified: 2024-11-21T04:48:31.707
Link: CVE-2019-7684

No data.