Vulnerability Description
An arbitrary file upload vulnerability in /classes/profile.class.php in Jigowatt "PHP Login & User Management" before 4.1.1, as distributed in the Envato Market, allows any remote authenticated user to upload .php files to the web server via a profile avatar field. This results in arbitrary code execution by requesting the .php file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jigowatt | Php Login \& User Management | < 4.1.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542038/100/0/threaded
- https://codecanyon.net/item/php-login-user-management/49008Release Notes
- https://doddsecurity.com/94/remote-code-execution-in-the-avatars/
- http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542038/100/0/threaded
- https://codecanyon.net/item/php-login-user-management/49008Release Notes
- https://doddsecurity.com/94/remote-code-execution-in-the-avatars/
FAQ
What is CVE-2018-11392?
CVE-2018-11392 is a vulnerability with a CVSS score of 8.8 (HIGH). An arbitrary file upload vulnerability in /classes/profile.class.php in Jigowatt "PHP Login & User Management" before 4.1.1, as distributed in the Envato Market, allows any remote authenticated user t...
How severe is CVE-2018-11392?
CVE-2018-11392 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11392?
Check the references section above for vendor advisories and patch information. Affected products include: Jigowatt Php Login \& User Management.