Unrestricted file upload vulnerability in cp_upload_image.php in LightBlog 9.5 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the blog's root directory.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/487398/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/27562 | vdb entry |
http://omni.netsons.org/blog/?p=11 | |
https://www.exploit-db.com/exploits/5033 | exploit |
http://securityreason.com/securityalert/3617 | third party advisory |
http://secunia.com/advisories/28734 | third party advisory vendor advisory |