CVE-2019-25714
Description
Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability in the /seeyon/htmlofficeservlet endpoint that allows remote attackers to write arbitrary files to the web application root by sending specially crafted POST requests with custom base64-encoded payloads. Attackers can write JSP webshells to the web root and execute them through the web server to achieve arbitrary OS command execution with web server privileges. Exploitation evidence was first observed by the Shadowserver Foundation on 2021-03-26 (UTC).
EPSS — Exploit Prediction
EPSS estimates the probability that this vulnerability will be exploited in the wild within the next 30 days. A higher score means more likely to be exploited.
Weakness Type (CWE)
References
Other References
Frequently Asked Questions
What is CVE-2019-25714? +
How do I check if I'm vulnerable to CVE-2019-25714? +
Related Vulnerabilities
pip handles concatenated tar and ZIP files as ZIP files regardless of filename or whether a file is both a …
The <redacted>.exe or <redacted>.exe CGI binary can be used to upload arbitrary files to /tmp/upload/ or /tmp/ respectively as any …
Emlog is an open source website building system. Prior to version 2.6.11, insecure plugin upload functionality allows attackers to upload …
This vulnerability allows a high-privileged authenticated PAM user to achieve remote command execution on the affected PAM system by uploading …
Inadequate checks in the Media Manager allowed users with "edit" privileges to change file extension to arbitrary extension, including .php …
The Ready_ application's Profile section allows users to upload files of any type and extension without restriction. If the server …