In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://blog.csdn.net/qq_36093477/article/details/86681178 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:43:13.298Z
Reserved: 2019-02-18T00:00:00Z
Link: CVE-2019-8933

No data.

Status : Modified
Published: 2019-02-19T02:29:00.213
Modified: 2024-11-21T04:50:41.313
Link: CVE-2019-8933

No data.