漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: 1. Install a package with a web Laravel application. 2. Navigate to the Upload window 3. Upload an image file, then capture the request 4. Edit the request contents with a malicious file (webshell) 5. Enter the path of file uploaded on URL - Remote Code Execution **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
laravel-filemanager代码问题漏洞
Vulnerability Description
laravel-filemanager是用于 Laravel 5 到 6 和 CKEditor / TinyMCE 的文件上传/编辑器。 laravel-filemanager 存在代码问题漏洞,该漏洞源于upload()函数在上传时没有充分验证文件类型。攻击者可以复制以下步骤进行漏洞利用:安装一个带有web Laravel应用程序的包。导航到上传窗口,上传一个图像文件,然后捕捉请求——编辑请求与一个恶意文件内容(网站管理权限)——输入文件上传URL的路径——远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A