Description
QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.
Problem types
CWE-434: Unrestricted Upload of File with Dangerous Type
Product status
3.0.9
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php
www.exploit-db.com/exploits/48751 (ExploitDB-48751)
www.howfor.com (Official Product Homepage)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5582.php (Vendor Security Advisory for ZSL-2020-5582)
www.vulncheck.com/...e-unauthenticated-remote-code-execution (VulnCheck Advisory: QiHang Media Web Digital Signage 3.0.9 Unauthenticated Remote Code Execution)