Unrestricted file upload vulnerability in the add2 action in a_upload.php in OneCMS 2.4, and possibly earlier, allows remote attackers to execute arbitrary code by uploading a file with an executable extension and using a safe content type such as image/gif, then accessing it via a direct request to the file in an unspecified directory.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.bugreport.ir/index_26.htm | exploit |
http://www.securityfocus.com/archive/1/485837/100/200/threaded | mailing list |
http://sourceforge.net/forum/forum.php?forum_id=774946 | |
http://www.vupen.com/english/advisories/2008/0081 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/487136/100/200/threaded | mailing list |
http://osvdb.org/51117 | vdb entry |
http://www.securityfocus.com/bid/27158 | vdb entry exploit |
https://www.exploit-db.com/exploits/4857 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39485 | vdb entry |