CVE-2020-7246
- Reference to the description:
- Description:
- A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
- Last updated date:
- 11/10/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/01/2020
- Reference url to background
http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/01/2020
- Reference url to background
https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/13/2022
- Reference url to background
http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/13/2022
- Reference url to background
http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 07/27/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 11/10/2022
- Reference url to background
http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html