Vulnerability Description
upload.php in tianchoy/blog through 2017-09-12 allows unrestricted file upload and PHP code execution by using the image/jpeg, image/pjpeg, image/png, or image/gif content type for a .php file.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Blog Project | Blog | <= 2017-09-12 |
Related Weaknesses (CWE)
References
- https://github.com/imsebao/404team/blob/master/tianchoy-blog-getshell.mdExploitThird Party Advisory
- https://github.com/imsebao/404team/blob/master/tianchoy-blog-getshell.mdExploitThird Party Advisory
FAQ
What is CVE-2017-14346?
CVE-2017-14346 is a vulnerability with a CVSS score of 9.8 (CRITICAL). upload.php in tianchoy/blog through 2017-09-12 allows unrestricted file upload and PHP code execution by using the image/jpeg, image/pjpeg, image/png, or image/gif content type for a .php file.
How severe is CVE-2017-14346?
CVE-2017-14346 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14346?
Check the references section above for vendor advisories and patch information. Affected products include: Blog Project Blog.