Vulnerability CVE-2014-5468


Published: 2020-02-07

Description:
A File Inclusion vulnerability exists in Railo 4.2.1 and earlier via a specially-crafted URL request to the thumbnail.cfm to specify a malicious PNG file, which could let a remote malicious user obtain sensitive information or execute arbitrary code.

See advisories in our WLB2 database:
Topic
Author
Date
High
Railo 4.2.1 Remote File Inclusion
Bryan Alexander
12.09.2014

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Getrailo -> Railo 

 References:
http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html
http://www.exploit-db.com/exploits/34669
https://exchange.xforce.ibmcloud.com/vulnerabilities/95959
https://vulmon.com/vulnerabilitydetails?qid=CVE-2014-5468
https://www.securityfocus.com/bid/69761

Copyright 2024, cxsecurity.com

 

Back to Top