Description
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on New Template, and modifying the filename from ../index.html to ../index.php.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://blog.csdn.net/qq_36093477/article/details/86681178
Scores
CVSS v3
8.8
EPSS
0.2435
EPSS Percentile
96.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
dedecms/dedecms
5.7 sp2
Published
Feb 19, 2019
Tracked Since
Feb 18, 2026