ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php.
References
Link | Resource |
---|---|
http://e107.org/comment.php?comment.news.672 | Broken Link Patch |
http://secunia.com/advisories/13657 | Broken Link Vendor Advisory |
http://securitytracker.com/id?1012657 | Broken Link Exploit Third Party Advisory VDB Entry |
http://www.osvdb.org/12586 | Broken Link |
http://www.securityfocus.com/bid/12111 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18670 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/704 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2024-01-26 19:10
NVD link : CVE-2004-2262
Mitre link : CVE-2004-2262
CVE.ORG link : CVE-2004-2262
JSON object : View
Products Affected
e107
- e107
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type