Publify file upload | CVE-2022-1811
NAME
Publify file upload
- Platforms Affected:
Publify Publify 9.2.8 - Risk Level:
9.1 - Exploitability:
Unproven - Consequences:
Gain Access
DESCRIPTION
Publifycould allow a remote authenticated attacker to upload arbitrary files, caused by the improper validation of file extensions by the resources/upload script. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious PHP script, which could allow the attacker to execute arbitrary PHP code on the vulnerable system.
CVSS 3.0 Information
- Privileges Required: Low
- User Interaction: None
- Scope: Changed
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: Low
- Integrity Impact: High
- Availability Impact: Low
- Remediation Level: Official Fix
MITIGATION
Refer to publify GIT Repository for patch, upgrade or suggested workaround information. See References.
- Reference Link:
https://huntr.dev/bounties/4d97f665-c9f1-4c38-b774-692255a7c44c/ - Reference Link:
https://github.com/publify/publify/commit/0fb6b027fbaf17f6a6551f2148482a03eac12927
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.