CVE-2021-47819
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| projeqtor | project_management | 9.1.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in ProjeQtOr Project Management version 9.1.4 allows guest users to upload malicious PHP files through the profile attachment section. By uploading a specially crafted PHP script, an attacker can execute arbitrary system commands on the server by accessing the uploaded file with a crafted request parameter. This leads to unauthorized remote code execution and privilege escalation. [1]
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary commands on the server hosting ProjeQtOr 9.1.4 without any authentication. This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, and escalation of privileges, posing a critical security risk to affected installations. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if the ProjeQtOr 9.1.4 instance allows uploading PHP files through the profile attachment section. One method is to attempt uploading a PHP file containing code like `<?php echo shell_exec($_GET['key'].' 2>&1'); ?>` as a guest user via the profile 'add photo' upload feature. After upload, verify if the system responds with a message like "Attachment #(number) inserted". Then, try accessing the uploaded file with a URL such as `http://ip:port/files/attach/attachment_1/yourfile.pHp.projeqtor?key=whoami` to see if the command output is returned, indicating successful code execution. This process effectively tests for the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling the file upload feature in the profile attachment section for guest users, restricting or validating file types to prevent uploading PHP or executable files, and applying any available patches or updates from ProjeQtOr that address this vulnerability. Additionally, monitor and restrict access to the upload directories and consider implementing web application firewall (WAF) rules to block malicious upload attempts and execution of uploaded scripts. [1]