We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability has been found in kefaming mayi up to 1.3.9 and classified as critical. This vulnerability affects the function Upload of the file app/tools/controller/File.php. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
In kefaming mayi bis 1.3.9 wurde eine kritische Schwachstelle gefunden. Dabei geht es um die Funktion Upload der Datei app/tools/controller/File.php. Mit der Manipulation des Arguments File mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-05-05: | Advisory disclosed |
2025-05-05: | VulDB entry created |
2025-05-05: | VulDB entry last update |
Caigo (VulDB User)
vuldb.com/?id.307408 (VDB-307408 | kefaming mayi File.php upload unrestricted upload)
vuldb.com/?ctiid.307408 (VDB-307408 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.563784 (Submit #563784 | https://github.com/kefaming/mayi mayi 1.3.9 Unrestricted Upload of File with Dangerous Type)
github.com/...蚁成绩管理系统/任意文件上传RCE.md
Support options