9.8
CVSSv3

CVE-2019-19576

Published: 04/12/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

class.upload.php in verot.net class.upload prior to 1.0.3 and 2.x prior to 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

verot project verot

getk2 k2

Exploits

# Exploit Title: Verot 203 - Remote Code Execution # Date: 2019-12-05 # Exploit Author: Jinny Ramsmark # Vendor Homepage: wwwverotnet/php_class_uploadhtm # Software Link: githubcom/verot/classuploadphp # Version: <=203 # Tested on: Ubuntu 1910, PHP 73, Apache/2441 # CVE : CVE-2019-19576 <?php #Title: jpeg payloa ...
Verot version 203 suffers from a remote code execution vulnerability ...

Github Repositories

This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4

CVE-2019-19634 - classuploadphp &lt;= 204 Arbitrary file upload Author - Jinny Ramsmark Affected vendor - Verotnet Affected product - classuploadphp &lt;= 204 Tested on newly installed Ubuntu 1404 with PHP5 and Apache Specifically Debian/Ubuntu has been found to be vulnerable since they add the pht extension among others to available PHP handlers In this cas