ID CVE-2010-4313
Summary Unrestricted file upload vulnerability in fileman_file_upload.php in Orbis CMS 1.0.2 allows remote authenticated users to execute arbitrary code by uploading a .php file, and then accessing it via a direct request to the file in uploads/. Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'
References
Vulnerable Configurations
  • cpe:2.3:a:novo-ws:orbis_cms:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:novo-ws:orbis_cms:1.0.2:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 10-10-2018 - 20:08)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
refmap via4
bid 45103
bugtraq 20101130 'Orbis CMS' Arbitrary Script Execution Vulnerability (CVE-2010-4313)
exploit-db 15636
misc http://www.uncompiled.com/2010/11/orbis-cms-arbitrary-script-execution-vulnerability-cve-2010-4313/
osvdb 69599
Last major update 10-10-2018 - 20:08
Published 02-12-2010 - 17:15
Last modified 10-10-2018 - 20:08
Back to Top