An arbitrary file upload vulnerability in /classes/profile.class.php in Jigowatt "PHP Login & User Management" before 4.1.1, as distributed in the Envato Market, allows any remote authenticated user to upload .php files to the web server via a profile avatar field. This results in arbitrary code execution by requesting the .php file.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://doddsecurity.com/94/remote-code-execution-in-the-avatars/ | |
http://packetstormsecurity.com/files/147878/PHP-Login-And-User-Management-4.1.0-Shell-Upload.html | vdb entry third party advisory |
https://codecanyon.net/item/php-login-user-management/49008 | release notes |
http://www.securityfocus.com/archive/1/542038/100/0/threaded | mailing list |