CVE-2018-18831
https://notcve.org/view.php?id=CVE-2018-18831
30 Oct 2018 — An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. Se ha descubierto un problema en com\mingsoft\cms\action\GeneraterAction.java en MCMS 4.6.5. Un atacante puede escribir un archivo .jsp (en el parámetro position) a un directorio arbitrario mediante un ../ (salto de directorio) en el parámetro url. • https://gitee.com/mingSoft/MCMS/issues/IO0K0 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-18830
https://notcve.org/view.php?id=CVE-2018-18830
30 Oct 2018 — An issue was discovered in com\mingsoft\basic\action\web\FileAction.java in MCMS 4.6.5. Since the upload interface does not verify the user login status, you can use this interface to upload files without setting a cookie. First, start an upload of JSP code with a .png filename, and then intercept the data packet. In the name parameter, change the suffix to jsp. In the response, the server returns the storage path of the file, which can be accessed to execute arbitrary JSP code. • https://gitee.com/mingSoft/MCMS/issues/IO0IQ • CWE-434: Unrestricted Upload of File with Dangerous Type •