A vulnerability classified as critical has been found in westboy CicadasCMS 1.0. This affects an unknown part of the file /upload/ of the component JSP Parser. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://vuldb.com/?id.304641 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.304641 | signature vdb entry permissions required |
https://vuldb.com/?submit.549981 | third party advisory vdb entry |
https://github.com/Bae-ke/cve/issues/1 | third party advisory issue tracking exploit |