Unrestricted file upload vulnerability in mod/contak.php in AuraCMS 2.1 allows remote attackers to upload and execute arbitrary PHP files via the image parameter, which places a file under files/.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/36539 | vdb entry |
https://www.exploit-db.com/exploits/4390 | exploit |
http://osvdb.org/40505 | vdb entry |
http://www.auracms.org/?pilih=news&aksi=lihat&id=117 | exploit |
http://secunia.com/advisories/26747 | third party advisory |
http://www.securityfocus.com/bid/25621 | vdb entry |