A vulnerability, which was classified as critical, has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This issue affects some unknown processing of the file sendfile.jsp. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://vuldb.com/?id.316991 | technical description third party advisory vdb entry |
https://vuldb.com/?ctiid.316991 | vdb entry permissions required signature |
https://vuldb.com/?submit.611252 | third party advisory vdb entry |
https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-Upload-4.md | exploit third party advisory |