605
VMScore

CVE-2019-7216

Published: 31/01/2019 Updated: 24/08/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in FileChucker 4.99e-free-e02. filechucker.cgi has a filter bypass that allows a malicious user to upload any type of file by using % characters within the extension, e.g., file.%ph%p becomes file.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

encodable filechucker 5.09

encodable filechucker 4.99e-free-e02

Github Repositories

Filechucker filter bypass Proof Of Concept

CVE-2019-7216 In filechuckercgi version 509 and filechucker_prefscgi version 499e-free-e02 there is a filter bypass, upon upload, that can lead to remote code execution providing that the user uploads a malicious file The bypass occurs when filechucker attempts to filter out the file extension and test against filechucker_prefs configuration of non-acceptable extensions: $