ID CVE-2004-1545
Summary UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
References
Vulnerable Configurations
  • cpe:2.3:a:moniwiki:moniwiki:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:moniwiki:moniwiki:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:moniwiki:moniwiki:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:moniwiki:moniwiki:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:moniwiki:moniwiki:1.0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:moniwiki:moniwiki:1.0.9.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 11951
bugtraq 20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki
confirm http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h
fulldisc 20041215 STG Security Advisory: [SSA-20041215-15] Vulnerability of uploading files with multiple extensions in MoniWiki
secunia 13478
xf moniwiki-file-upload(18493)
Last major update 11-07-2017 - 01:31
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:31
Back to Top