漏洞标题
N/A
漏洞描述信息
"Invision Power Board (IPB或IP.Board) 2.3.1 及以上版本中的ips_kernel/class_upload.php允许远程攻击者上传任意脚本文件以及精心构造的图像文件名,将其保存在uploads/目录下,文件名以.txt扩展名保存,且不可执行。注意:在此有限使用场景中,这可能是一个漏洞,但由于供应商表示这是与安全性相关的,因此正在跟踪该漏洞。。"
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
ips_kernel/class_upload.php in Invision Power Board (IPB or IP.Board) 2.3.1 up to 20070912 allows remote attackers to upload arbitrary script files with crafted image filenames to uploads/, where they are saved with a .txt extension and are not executable. NOTE: there are limited usage scenarios under which this would be a vulnerability, but it is being tracked by CVE since the vendor has stated it is security-relevant.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Invision Invision Power Services Invision Power Board 代码注入漏洞
漏洞描述信息
Invision Power Board (IPB or IP.Board) 2.3.1升级至20070912中的ips_kernel/class_upload.php允许远程攻击者上传定制图像文件名的任意脚本文件到uploads/, 会保存为.txt扩展名并不会被执行。
CVSS信息
N/A
漏洞类别
代码注入