Vulnerability Description
SchoolCMS version 2.3.1 allows file upload via the logo upload feature at admin.php?m=admin&c=site&a=save by using the .jpg extension, changing the Content-Type to image/php, and placing PHP code after the JPEG data. This ultimately allows execution of arbitrary PHP code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schoolcms | Schoolcms | 2.3.1 |
Related Weaknesses (CWE)
References
- http://www.iwantacve.cn/index.php/archives/125/ExploitThird Party Advisory
- http://www.iwantacve.cn/index.php/archives/125/ExploitThird Party Advisory
FAQ
What is CVE-2019-9181?
CVE-2019-9181 is a vulnerability with a CVSS score of 7.2 (HIGH). SchoolCMS version 2.3.1 allows file upload via the logo upload feature at admin.php?m=admin&c=site&a=save by using the .jpg extension, changing the Content-Type to image/php, and placing PHP code afte...
How severe is CVE-2019-9181?
CVE-2019-9181 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9181?
Check the references section above for vendor advisories and patch information. Affected products include: Schoolcms Schoolcms.