Vulnerability Description
A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP content if the first few characters match GIF data, and the filename ends in ".php" with mixed case, such as the .pHp extension.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rukovoditel | Rukovoditel | 2.3.1 |
Related Weaknesses (CWE)
References
- https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-AuthentExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46011ExploitThird Party AdvisoryVDB Entry
- https://pentest.com.tr/exploits/Rukovoditel-Project-Management-CRM-2-3-1-AuthentExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46011ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-20166?
CVE-2018-20166 is a vulnerability with a CVSS score of 8.8 (HIGH). A file-upload vulnerability exists in Rukovoditel 2.3.1. index.php?module=configuration/save allows the user to upload a background image, and mishandles extension checking. It accepts uploads of PHP ...
How severe is CVE-2018-20166?
CVE-2018-20166 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20166?
Check the references section above for vendor advisories and patch information. Affected products include: Rukovoditel Rukovoditel.