Unrestricted file upload vulnerability in ftp_upload_file.php in Support Incident Tracker (aka SiT!) 3.65 allows remote authenticated users to execute arbitrary PHP code by uploading a PHP file, then accessing it via a direct request to the file in an unspecified directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/71651 | vdb entry |
http://www.securityfocus.com/bid/50632 | vdb entry exploit |
http://www.kb.cert.org/vuls/id/576355 | third party advisory us government resource |
http://secunia.com/secunia_research/2011-79/ | vendor advisory |
http://www.securityfocus.com/bid/50896 | vdb entry exploit |
http://www.exploit-db.com/exploits/18108 | exploit |
http://secunia.com/advisories/45453 | third party advisory vendor advisory |
http://packetstormsecurity.org/files/106933/sit_file_upload.rb.txt | exploit |
http://www.osvdb.org/77003 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71237 | vdb entry |