CVE-2006-3128
Severity:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/06/2006
Last modified:
18/10/2018
Description
choose_file.php in easy-CMS 0.1.2, when mod_mime is installed, does not restrict uploads of filenames with multiple extensions, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file with a GIF file extension, then directly accessing that file in the Repositories directory.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:easy-cms:easy-cms:0.1.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://biyosecurity.be/bugs/easycms.txt
- http://secunia.com/advisories/20733
- http://securitytracker.com/id?1016335=
- http://www.osvdb.org/26633
- http://www.securityfocus.com/archive/1/437705/100/0/threaded
- http://www.securityfocus.com/bid/18496
- http://www.vupen.com/english/advisories/2006/2419
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27281