{"id":"CVE-2019-17188","details":"An unrestricted file upload vulnerability was discovered in catalog/productinfo/imageupload in Fecshop FecMall 2.3.4. An attacker can bypass a front-end restriction and upload PHP code to the webserver, by providing image data and the image/jpeg content type, with a .php extension. This occurs because the code relies on the getimagesize function.","modified":"2026-04-11T20:52:51.497419Z","published":"2019-10-04T22:15:11.270Z","references":[{"type":"REPORT","url":"https://github.com/fecshop/yii2_fecshop/issues/77"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fecshop/yii2_fecshop","events":[{"introduced":"0"},{"last_affected":"b15d7ed0f9ede3a75cbe971f10688567c5a95e9b"}],"database_specific":{"cpe":"cpe:2.3:a:fecmall:fecmall:2.3.4:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.3.4"}]}}],"versions":["1.0.0.0","1.0.0.1","1.0.0.2","1.0.0.3","1.0.0.4","1.0.0.5","1.0.0.6","1.0.0.7","1.0.0.8","1.0.0.9","1.0.1.1","1.0.1.2","1.0.1.3","1.0.1.4","1.1.1","1.1.2.1","1.1.2.2","1.1.2.3","1.1.2.4","1.1.2.5","1.1.2.6","1.1.2.7","1.1.2.8","1.1.2.9","1.1.3.0","1.1.3.1","1.1.3.2","1.1.3.3","1.1.3.4","1.1.3.5","1.1.3.6","1.1.3.7","1.1.3.8","1.1.3.9","1.1.4.1","1.1.4.2","1.1.4.3","1.1.4.4","1.1.4.5","1.1.4.6","1.1.4.7","1.2.1.1","1.2.1.2","1.2.2.1","1.2.2.2","1.2.2.3","1.2.2.4","1.2.2.5","1.2.2.6","1.2.2.7","1.2.2.8","1.3.0.0","1.3.0.1","1.3.1.0","1.3.2.0","1.3.2.1","1.4.0.0","1.4.0.1","1.4.1.0","1.4.2.0","1.4.2.1","1.4.3.0","1.4.3.1","1.4.3.2","1.4.4.0","1.4.5.0","1.4.6.0","1.4.6.1","1.4.6.3","1.4.6.4","1.5.0.0","1.5.1.0","1.5.1.1","1.6.0.0","1.6.1.0","1.6.2.0","1.6.3.0","1.7.0.0","1.7.1.0","1.7.2.0","1.7.3.0","1.7.4.0","1.8.0.0","1.9.0.0","1.9.1.0","2.0.0","2.0.1","2.1.0","2.1.1","2.1.2","2.1.4","2.1.5","2.1.6","2.2.0","2.2.1","2.2.2","2.3.0","2.3.1","2.3.2","2.3.3","2.3.4","v1.4.6.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-17188.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}