GAT-Ship Web Module before 1.40 suffers from a vulnerability allowing authenticated attackers to upload any file type to the server via the "Documents" area. This vulnerability is related to "uploadDocFile.aspx".
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://vuldb.com/?id.133141 | third party advisory |
https://seclists.org/fulldisclosure/2019/Apr/14 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2019/Apr/33 | third party advisory mailing list |
http://packetstormsecurity.com/files/152643/GAT-Ship-Web-Module-Unrestricted-File-Upload.html | vdb entry third party advisory |