Vulnerability Description
Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an administrator (e.g., by configuring .php to be a valid image file type).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Abantecart | Abantecart | <= 1.3.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Executi
- https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txtExploitThird Party Advisory
- http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Executi
- https://github.com/sartlabs/0days/blob/main/Abantecart/Exploit.txtExploitThird Party Advisory
FAQ
What is CVE-2022-26521?
CVE-2022-26521 is a vulnerability with a CVSS score of 7.2 (HIGH). Abantecart through 1.3.2 allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Catalog>Media Manager>Images settings can be changed by an ad...
How severe is CVE-2022-26521?
CVE-2022-26521 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-26521?
Check the references section above for vendor advisories and patch information. Affected products include: Abantecart Abantecart.