Discuz! 4.0 rc4 does not properly restrict types of files that are uploaded to the server, which allows remote attackers to execute arbitrary commands via a filename containing ".php.rar" or other multiple extensions that include .php.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html | mailing list exploit vendor advisory |
http://securitytracker.com/id?1014673 | vdb entry |
http://www.securityfocus.com/bid/14564 | vdb entry |
http://secunia.com/advisories/16433 | third party advisory vendor advisory |