Vulnerability Description
SchoolCMS version 2.3.1 allows file upload via the theme upload feature at admin.php?m=admin&c=theme&a=upload by using the .zip extension along with the _Static substring, changing the Content-Type to application/zip, and placing PHP code after the ZIP header. This ultimately allows execution of arbitrary PHP code in Public\Home\1_Static.php because of mishandling in the Application\Admin\Controller\ThemeController.class.php Upload() function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schoolcms | Schoolcms | 2.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/PearlyNautilus/Security-Code-Review/issues/3ExploitThird Party Advisory
- https://github.com/PearlyNautilus/Security-Code-Review/issues/3ExploitThird Party Advisory
FAQ
What is CVE-2019-9572?
CVE-2019-9572 is a vulnerability with a CVSS score of 7.2 (HIGH). SchoolCMS version 2.3.1 allows file upload via the theme upload feature at admin.php?m=admin&c=theme&a=upload by using the .zip extension along with the _Static substring, changing the Content-Type to...
How severe is CVE-2019-9572?
CVE-2019-9572 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9572?
Check the references section above for vendor advisories and patch information. Affected products include: Schoolcms Schoolcms.