UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html - Patch, Vendor Advisory | |
References | () http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h - | |
References | () http://marc.info/?l=bugtraq&m=110314544711884&w=2 - | |
References | () http://secunia.com/advisories/13478 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/11951 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18493 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1545
Mitre link : CVE-2004-1545
CVE.ORG link : CVE-2004-1545
JSON object : View
Products Affected
moniwiki
- moniwiki
CWE