Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://rastating.github.io/gila-cms-upload-filter-bypass-and-rce/ | third party advisory exploit |
https://github.com/GilaCMS/gila/pull/49 | third party advisory exploit |