XpressEngine XpressEngine 1.9.7

CPE Details

XpressEngine XpressEngine 1.9.7
1.9.7
2022-02-10
15h21 +00:00
2022-02-11
21h40 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:xpressengine:xpressengine:1.9.7:*:*:*:*:*:*:*

Informations

Vendor

xpressengine

Product

xpressengine

Version

1.9.7

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-26642 2023-01-19 23h00 +00:00 When uploading an image file to a bulletin board developed with XpressEngine, a vulnerability in which an arbitrary file can be uploaded due to insufficient verification of the file. A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running.
9.8
Critique
CVE-2021-44912 2022-02-09 14h55 +00:00 In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL.
5.4
Moyen
CVE-2021-44911 2022-02-09 14h40 +00:00 XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities.
5.4
Moyen