ID CVE-2015-2842
Summary Unrestricted file upload vulnerability in go_audiostore.php in the audiostore (Voice Files) upload functionality in GoAutoDial GoAdmin CE 3.x before 3.3-1421902800 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in sounds/. <a href="http://cwe.mitre.org/data/definitions/434.html">CWE-434: Unrestricted Upload of File with Dangerous Type</a>
References
Vulnerable Configurations
  • cpe:2.3:a:goautodial:goadmin_ce:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:goautodial:goadmin_ce:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:goautodial:goadmin_ce:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:goautodial:goadmin_ce:3.3:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 09-10-2018 - 19:56)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 74281
bugtraq 20150421 GoAutoDial 3.3 multiple vulnerabilities
confirm http://goautodial.org/news/21
exploit-db 36807
misc http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html
Last major update 09-10-2018 - 19:56
Published 12-05-2015 - 19:59
Last modified 09-10-2018 - 19:56
Back to Top