upload.php in YaPiG 0.92b, 0.93u and 0.94u does not properly restrict the file extension for uploaded image files, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://secunia.com/advisories/15600/ | vendor advisory broken link third party advisory |
http://www.osvdb.org/17115 | vendor advisory broken link vdb entry |
http://secwatch.org/advisories/secwatch/20050530_yapig.txt | vendor advisory broken link |
http://securitytracker.com/id?1014103 | vdb entry exploit vendor advisory broken link third party advisory |