WalRack 1.x before 1.1.9 and 2.x before 2.0.7 does not properly restrict file uploads, which allows remote attackers to execute arbitrary PHP code via vectors involving a double extension, as demonstrated by a .php.zzz file.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://jvn.jp/en/jp/JVN46984044/index.html | third party advisory |
http://www.securityfocus.com/bid/48001 | vdb entry |
http://digit.que.ne.jp/work/index.cgi?WalRack2 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67641 | vdb entry |
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000032 | third party advisory |
http://jvn.jp/en/jp/JVN46984044/54827/index.html | |
http://digit.que.ne.jp/work/index.cgi?WalRack | patch |