{"api_version":"1","generated_at":"2026-05-01T15:52:09+00:00","cve":"CVE-2019-11401","urls":{"html":"https://cve.report/CVE-2019-11401","api":"https://cve.report/api/cve/CVE-2019-11401.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-11401","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-11401"},"summary":{"title":"CVE-2019-11401","description":"A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the \"as\" substring is deleted.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-04-22 11:29:00","updated_at":"2019-04-24 20:36:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://github.com/siteserver/cms/issues/1858","name":"https://github.com/siteserver/cms/issues/1858","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"There is a vulnerability that the attacker can uploads a file bypassed the filtering rule to getshell. · Issue #1858 · siteserver/cms · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-11401","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11401","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"11401","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siteserver","cpe5":"siteserver_cms","cpe6":"6.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11401","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"siteserver","cpe5":"siteserver_cms","cpe6":"6.9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-11401","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the \"as\" substring is deleted."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/siteserver/cms/issues/1858","refsource":"MISC","name":"https://github.com/siteserver/cms/issues/1858"}]}},"nvd":{"publishedDate":"2019-04-22 11:29:00","lastModifiedDate":"2019-04-24 20:36:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:siteserver:siteserver_cms:6.9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"11401","Ordinal":"149692","Title":"CVE-2019-11401","CVE":"CVE-2019-11401","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"11401","Ordinal":"1","NoteData":"A issue was discovered in SiteServer CMS 6.9.0. It allows remote attackers to execute arbitrary code because an administrator can add the permitted file extension .aassp, which is converted to .asp because the \"as\" substring is deleted.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"11401","Ordinal":"2","NoteData":"2019-04-21","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"11401","Ordinal":"3","NoteData":"2019-04-21","Type":"Other","Title":"Modified"}]}}}