vendor:
ProjeQtOr Project Management Tool
by:
Özkan Mustafa Akkuş (AkkuS)
8.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: ProjeQtOr Project Management Tool
Affected Version From: 7.2.5 and lower versions
Affected Version To: 7.2.5 and lower versions
Patch Exists: YES
Related CWE: CVE-2018-18924
CPE: a:projeqtor:projeqtor_project_management_tool
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: XAMPP for Linux 7.2.8-0
2018
ProjeQtOr Project Management Tool 7.2.5 – Remote Code Execution
ProjeQtOr PMT 7.2.5 and lower versions allows to upload arbitrary 'shtml' files which leads to a remote command execution on the remote server. An attacker can create a file with HTML code and save it as .shtml, login to ProjeQtOr portal as priviliage user, click (Image) button on Content panel, choose Upload section and browse the .shtml file, click 'Send it to Server'. The file will be sent to the server and the attacker can find the file by using the formula Y+m+d+H+i+s+_+UserID+_+filename = uploaded file name. The uploaded images are sent under the '/files/images/' folder and the attacker can verify the exploit by using http://domain/files/image/20181023010230_1_RCE.shtml?ls
Mitigation:
Ensure that the application is up to date and patched with the latest security updates. Restrict access to the application and limit the privileges of the users.