Описание
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-4171
- http://archives.neohapsis.com/archives/bugtraq/2005-11/0301.html
- http://rgod.altervista.org/efiction2_xpl.html
- http://secunia.com/advisories/17777
- http://securitytracker.com/id?1015273
- http://www.efiction.wallflowergirl.com/forums/viewtopic.php?t=1555
- http://www.osvdb.org/21124
- http://www.securityfocus.com/bid/15568
EPSS
CVE ID
Связанные уязвимости
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
EPSS