zb_system/function/lib/upload.php in Z-BlogPHP through 1.5.1 allows remote attackers to execute arbitrary PHP code by using the image/jpeg content type in an upload to the zb_system/admin/index.php?act=UploadMng URI. NOTE: The vendor's position is "We have no dynamic including. No one can run PHP by uploading an image in current version." It also requires authentication
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell | Broken Link Third Party Advisory | 
| https://github.com/zblogcn/zblogphp/issues/205 | Third Party Advisory | 
| https://github.com/novysodope/Z-BlogPHP1.5Zero/blob/master/Getshell | Broken Link Third Party Advisory | 
| https://github.com/zblogcn/zblogphp/issues/205 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-11-22 21:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19463
Mitre link : CVE-2018-19463
CVE.ORG link : CVE-2018-19463
JSON object : View
Products Affected
                zblogcn
- z-blogphp
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
