Submit #277443: JPShop JPShop <=1.5.02 Arbitrary File Uploadinfo

TitleJPShop JPShop <=1.5.02 Arbitrary File Upload
DescriptionThe JPShop application, specifically its version up to 1.5.02, contains an Arbitrary File Upload vulnerability within the ComboController.php file located in the /api/controllers/admin/app/ directory. This vulnerability arises due to the application's failure to properly validate user-supplied input for the pic_url parameter, which is processed by the actionIndex function. An attacker can exploit this flaw by encoding malicious content and sending a specially crafted PUT request to upload arbitrary files, including potentially executable scripts, to the server. Once uploaded, the attacker can then use another endpoint to retrieve the filename and subsequently access or execute the file on the server, leading to a potential compromise of the system.
Source⚠️ https://note.zhaoj.in/share/H73DuWdyifaI
Userglzjin (ID 59815)
Submission02/04/2024 09:47 AM (4 months ago)
Moderation02/06/2024 09:29 AM (2 days later)
StatusAccepted
VulDB Entry252999

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!