Vulnerability CVE-2004-1545


Published: 2004-12-31   Modified: 2012-02-12

Description:
UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Moniwiki -> Moniwiki 

 References:
http://xforce.iss.net/xforce/xfdb/18493
http://www.securityfocus.com/bid/11951
http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html
http://secunia.com/advisories/13478
http://marc.theaimsgroup.com/?l=bugtraq&m=110314544711884&w=2
http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h

Copyright 2024, cxsecurity.com

 

Back to Top