An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://sunian19.github.io/2020/09/08/UCMS%20v.1.4.8%20Command%20execution/ | third party advisory exploit |