Vulnerability Details : CVE-2019-19576
Potential exploit
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
Products affected by CVE-2019-19576
- cpe:2.3:a:verot_project:verot:*:*:*:*:*:*:*:*
- cpe:2.3:a:verot_project:verot:*:*:*:*:*:*:*:*
- cpe:2.3:a:getk2:k2:*:*:*:*:*:joomla\!:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-19576
44.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-19576
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-19576
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-19576
-
https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124
Update class.upload.php · getk2/k2@d134470 · GitHubPatch;Third Party Advisory
-
https://github.com/jra89/CVE-2019-19576
GitHub - jra89/CVE-2019-19576: This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.3Exploit;Third Party Advisory
-
https://github.com/verot/class.upload.php/compare/1.0.2...1.0.3
Comparing 1.0.2...1.0.3 · verot/class.upload.php · GitHubPatch;Third Party Advisory
-
https://www.verot.net/php_class_upload.htm
class.upload.php - verot.netVendor Advisory
-
https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2
blacklist .phar extension · verot/class.upload.php@db1b4fe · GitHubPatch;Third Party Advisory
-
https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4
Comparing 2.0.3...2.0.4 · verot/class.upload.php · GitHubPatch;Third Party Advisory
-
https://www.verot.net
Web development, design and free software code - verot.netProduct
-
http://packetstormsecurity.com/files/155577/Verot-2.0.3-Remote-Code-Execution.html
Verot 2.0.3 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://medium.com/@jra8908/cve-2019-19576-e9da712b779
CVE-2019–19576 (Arbitrary file upload in class.upload.php)Exploit;Third Party Advisory
-
https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1
blacklist .phar extension · verot/class.upload.php@5a7505d · GitHubPatch;Third Party Advisory
Jump to