Vulnerability Description
osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Osclass | Osclass | 3.6.1 |
Related Weaknesses (CWE)
References
- https://blog.ripstech.com/2016/osclass-remote-code-execution-via-image-file/Third Party Advisory
- https://demo.ripstech.com/projects/osclass_3.6.1Third Party Advisory
- https://blog.ripstech.com/2016/osclass-remote-code-execution-via-image-file/Third Party Advisory
- https://demo.ripstech.com/projects/osclass_3.6.1Third Party Advisory
FAQ
What is CVE-2016-10751?
CVE-2016-10751 is a vulnerability with a CVSS score of 7.2 (HIGH). osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP...
How severe is CVE-2016-10751?
CVE-2016-10751 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10751?
Check the references section above for vendor advisories and patch information. Affected products include: Osclass Osclass.