ImageManager in e107 before 0.617 does not properly check the types of uploaded files, which allows remote attackers to execute arbitrary code by uploading a PHP file via the upload parameter to images.php.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://securitytracker.com/id?1012657 | exploit vdb entry third party advisory broken link |
https://www.exploit-db.com/exploits/704 | exploit vdb entry third party advisory |
http://e107.org/comment.php?comment.news.672 | patch broken link |
http://www.securityfocus.com/bid/12111 | vdb entry third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18670 | vdb entry third party advisory |
http://secunia.com/advisories/13657 | broken link third party advisory vendor advisory |
http://www.osvdb.org/12586 | vdb entry broken link |