← Volver a CVEs
CVE-2018-20159
N/ADescripcion
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a ".zip" file because a ZIP archive is accepted by /admin/?req=modules&action=add as a plugin, and extracted to the main directory. In order for the ".zip" file to be accepted, it must also contain a package.json file.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado12/15/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
i-doit:i-doit
Debilidades (CWE)
CWE-20
Referencias
https://www.exploit-db.com/exploits/45957(cve@mitre.org)
https://pentest.com.tr/exploits/i-doit-CMDB-1-11-2-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/45957(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.