Description
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
Exploits (8)
exploitdb
WORKING POC
VERIFIED
by RedHatAugust · pythonwebappsphp
https://www.exploit-db.com/exploits/50944
exploitdb
WORKING POC
VERIFIED
by Leon Trappett · pythonwebappsphp
https://www.exploit-db.com/exploits/50175
exploitdb
WORKING POC
by Tobin Shields · pythonwebappsmultiple
https://www.exploit-db.com/exploits/48146
exploitdb
WORKING POC
by Rishal Dwivedi · pythonwebappsphp
https://www.exploit-db.com/exploits/47954
metasploit
WORKING POC
EXCELLENT
by Rishal Dwivedi (Loginsoft), Leon Trappett (thepcn3rd), Giacomo Casoni · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/qdpm_authenticated_rce.rb
References (5)
Scores
CVSS v3
8.8
EPSS
0.9059
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
+1 more repos
Details
CWE
CWE-22
CWE-434
Status
published
Products (1)
qdpm/qdpm
< 9.1
Published
Jan 21, 2020
Tracked Since
Feb 18, 2026