CVE-2019-19634: class.upload.php in verot.net omits .pht from the set of dangerous file extensions
9.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
verot/class.upload.php | composer | <= 1.0.3 | |
verot/class.upload.php | composer | >= 2.0.0, <= 2.0.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from an incomplete dangerous file extension blacklist. The CVE description explicitly states '.pht' was omitted from the forbidden extensions, which is critical because Apache servers often execute .pht files as PHP scripts. While the exact function name isn't shown in provided code snippets, class.upload.php's security validation logic for uploaded files (commonly implemented in a check_security or similar method) would be responsible for extension validation. The GitHub advisory reference to line 3068 shows proximity to security-related variables like $no_script and MIME checks, strongly suggesting the extension validation occurs in this area. The high confidence comes from the direct correlation between the CVE's root cause (missing .pht in blacklist) and the extension validation function's responsibility.