Vulnerability Description
DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contains a file such as "1.jpg.php" (because input validation only checks that .jpg, .png, or .gif is present as a substring, and does not otherwise check the file name or content).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dedecms | Dedecms | < 5.7 |
Related Weaknesses (CWE)
References
- http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BCExploitThird Party Advisory
- http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BCExploitThird Party Advisory
FAQ
What is CVE-2019-8362?
CVE-2019-8362 is a vulnerability with a CVSS score of 7.5 (HIGH). DedeCMS through V5.7SP2 allows arbitrary file upload in dede/album_edit.php or dede/album_add.php, as demonstrated by a dede/album_edit.php?dopost=save&formzip=1 request with a ZIP archive that contai...
How severe is CVE-2019-8362?
CVE-2019-8362 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-8362?
Check the references section above for vendor advisories and patch information. Affected products include: Dedecms Dedecms.