漏洞描述 MOStlyCE 2.4版本之前的版本的图像管理器,当在Mambo 4.6.3版本及其早期版本中运行时,远程攻击者可以借助一个FileUpload指令中的修改过的file[NewFile][name], file[NewFile][tmp_name]和file[NewFile][size]参数,且这些参数被用来在is_uploaded_file核查失败时修改$_FILES中的对等自变量,以重命名任意文件并造成拒绝服务。
相关漏洞推荐 POC CVE-2019-14206: Nevma Adaptive Images - Arbitrary File Deletion POC wp-duracelltomi-google-tag-manager-fpd: WordPress Plugin Google Tag Manager - Full Path Disclosure 青岛东胜伟业软件有限公司东胜物流软件GetUserModuleEnable modulename参数存在SQL注入漏洞 POC wordpress-menu-image-fpd: WordPress Menu Image - Full Path Disclosure POC imageresizer-debug-exposure: ImageResizer Debug - Information Exposure POC wp-image-widget-fpd: Image Widget - Full Path Disclosure POC wp-duracelltomi-google-tag-manager-fpd: WordPress Plugin Google Tag Manager - Full Path Disclosure ETAP Safety Manager 跨站脚本漏洞 POC JNPF快速开发平台 /api/file/Image/userAvatar/aa 文件读取漏洞 POC CVE-2020-26836: SAP Solution Manager - Open Redirect POC bitrix-log-file-disclosure: Bitrix Site Manager - Log File Disclosure POC nexus-repository-anonymous-access: Nexus Repository Manager - Anonymous Access Enabled 天锐绿盾审批系统 /trwfe/login.jsp/.%2e/menu/findModulePage.do SQL 注入漏洞