Описание
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4602
- https://www.exploit-db.com/exploits/2288
- http://isc.sans.org/diary.php?storyid=1672
- http://secunia.com/advisories/21733
- http://secunia.com/advisories/22100
- http://security.gentoo.org/glsa/glsa-200609-16.xml
- http://tikiwiki.org/tiki-read_article.php?articleId=136
- http://www.osvdb.org/28456
- http://www.securityfocus.com/bid/19819
- http://www.vupen.com/english/advisories/2006/3450
EPSS
CVE ID
Связанные уязвимости
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 S ...
EPSS