7.5
CVSSv3

CVE-2019-12744

Published: 20/06/2019 Updated: 25/06/2021
CVSS v2 Base Score: 6 | Impact Score: 6.4 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 605
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

SeedDMS prior to 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

seeddms seeddms

Exploits

# Exploit Title: [Remote Command Execution through Unvalidated File Upload in SeedDMS versions <5111] # Google Dork: [NA] # Date: [20-June-2019] # Exploit Author: [Nimit Jain](wwwlinkedincom/in/nimitiitk)(secfolksblogspotcom) # Vendor Homepage: [wwwseeddmsorg] # Software Link: [sourceforgenet/projects/see ...
SeedDMS versions prior to 5111 suffers from a remote shell upload vulnerability ...
Seeddms version 5110 authenticated remote command execution exploit ...

Github Repositories

Remote Command Execution through Unvalidated File Upload in SeedDMS versions <5.1.11

CVE-2019-12744 Information Exploit Title: Remote Command Execution through Unvalidated File Upload in SeedDMS versions &lt; 5111 CVE: CVE-2019-12744 Vendor Homepage: wwwseeddmsorg/indexphp?id=2 Exploit Author: NobodyAtall Tested version: Seeddms 5110, 5011 Tested OS: Windows 7 x64 Medium Article bryanleong98mediumcom/cve-2019-12744-remote-com