ID CVE-2005-4171
Summary The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
References
Vulnerable Configurations
  • cpe:2.3:a:efiction_project:efiction:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:efiction_project:efiction:1.1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:56)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 15568
bugtraq 20051125 eFiction <= 2.0 multiple vulnerabilities
confirm http://www.efiction.wallflowergirl.com/forums/viewtopic.php?t=1555
misc http://rgod.altervista.org/efiction2_xpl.html
osvdb 21124
sectrack 1015273
secunia 17777
Last major update 05-09-2008 - 20:56
Published 11-12-2005 - 21:03
Last modified 05-09-2008 - 20:56
Back to Top