Description
A file upload vulnerability in application/shop/controller/member.php in Niushop B2B2C Multi-business basic version V1.11 allows any remote member to upload a .php file to the web server via a profile avatar field, by using an image Content-Type (e.g., image/jpeg) with a modified filename and file content. This results in arbitrary code execution by requesting that .php file.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/GitHaaH/issue/blob/master/Niushop.md
Scores
CVSS v3
8.8
EPSS
0.0084
EPSS Percentile
74.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
niushop/b2b2c_multi-business
1.11
Published
Jul 23, 2018
Tracked Since
Feb 18, 2026