{"api_version":"1","generated_at":"2026-04-27T14:35:47+00:00","cve":"CVE-2019-11446","urls":{"html":"https://cve.report/CVE-2019-11446","api":"https://cve.report/api/cve/CVE-2019-11446.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-11446","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-11446"},"summary":{"title":"CVE-2019-11446","description":"An issue was discovered in ATutor through 2.2.4. It allows the user to run commands on the server with the teacher user privilege. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. The $IllegalExtensions value only lists lowercase (and thus .phP is a bypass), and omits .shtml and .phtml.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-04-22 11:29:00","updated_at":"2019-04-26 15:41:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://www.exploit-db.com/exploits/46691/","name":"46691","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"ATutor < 2.2.4 - 'file_manager' Remote Code Execution (Metasploit) - PHP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html","name":"http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"Pentest Blog - Self-Improvement to Ethical Hacking","mime":"text/x-ruby","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-11446","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11446","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"11446","vulnerable":"1","versionEndIncluding":"2.2.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atutor","cpe5":"atutor","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-11446","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in ATutor through 2.2.4. It allows the user to run commands on the server with the teacher user privilege. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. The $IllegalExtensions value only lists lowercase (and thus .phP is a bypass), and omits .shtml and .phtml."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"EXPLOIT-DB","name":"46691","url":"https://www.exploit-db.com/exploits/46691/"},{"url":"http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html","refsource":"MISC","name":"http://pentest.com.tr/exploits/ATutor-2-2-4-file-manager-Remote-Code-Execution-Injection-Metasploit.html"}]}},"nvd":{"publishedDate":"2019-04-22 11:29:00","lastModifiedDate":"2019-04-26 15:41:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"11446","Ordinal":"149738","Title":"CVE-2019-11446","CVE":"CVE-2019-11446","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"11446","Ordinal":"1","NoteData":"An issue was discovered in ATutor through 2.2.4. It allows the user to run commands on the server with the teacher user privilege. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. The $IllegalExtensions value only lists lowercase (and thus .phP is a bypass), and omits .shtml and .phtml.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"11446","Ordinal":"2","NoteData":"2019-04-22","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"11446","Ordinal":"3","NoteData":"2019-04-24","Type":"Other","Title":"Modified"}]}}}