Remote Code Execution in ProjeQtOr 7.2.5 by File Upload Vulnerability
CVE-2018-18924

8.8HIGH

Key Information:

Vendor

Projeqtor

Status
Vendor
CVE Published:
4 November 2018

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2018-18924?

The image-upload feature in ProjeQtOr version 7.2.5 is compromised, enabling remote attackers to execute arbitrary code. This is possible due to an error in handling rejected file uploads, where invalid files are still retained on the server with predictable filenames following a misleading 'This file is not a valid image' message. By exploiting this vulnerability, an attacker can upload a specifically crafted .shtml file containing malicious commands, leading to potential unauthorized access and system manipulation.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.