Unrestricted file upload vulnerability in banner-edit.php in OpenX adserver 2.8.1 and earlier allows remote authenticated users with banner / file upload permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an images directory.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/508050/100/0/threaded | mailing list |
http://www.openx.org/docs/2.8/release-notes/openx-2.8.2 | vendor advisory |
http://secunia.com/advisories/37475 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/54394 | vdb entry |
https://developer.openx.org/jira/browse/OX-5747 | |
http://www.securityfocus.com/bid/37110 | vdb entry |
http://osvdb.org/60499 | vdb entry |