Multiple unrestricted file upload vulnerabilities in Kusaba 1.0.4 and earlier allow remote authenticated users to execute arbitrary code by uploading a file with an executable extension using (1) load_receiver.php or (2) a shipainter action to paint_save.php, then accessing the uploaded file via a direct request to this file in their user directory.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/6706 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45793 | vdb entry |
http://www.securityfocus.com/bid/31668 | vdb entry |
http://www.securityfocus.com/bid/31685 | vdb entry vendor advisory |
https://www.exploit-db.com/exploits/6711 | exploit |
http://securityreason.com/securityalert/4782 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45794 | vdb entry |