Unrestricted file upload vulnerability in e107 before 0.7.20 allows remote authenticated users to execute arbitrary code by uploading a .php.filetypesphp file. NOTE: the vendor disputes the significance of this issue, noting that "an odd set of preferences and a missing file" are required.
Link | Tags |
---|---|
http://e107.org/svn_changelog.php?version=0.7.20 | |
http://www.vupen.com/english/advisories/2010/0919 | vdb entry vendor advisory |
http://www.securityfocus.com/bid/39540 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/57932 | vdb entry |
http://secunia.com/secunia_research/2010-44/ | vendor advisory |
http://e107.org/comment.php?comment.news.864 | patch vendor advisory |
http://secunia.com/advisories/39013 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/510805/100/0/threaded | mailing list |