Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file.
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/25307 - | |
References | () http://secunia.com/advisories/26784 - | |
References | () http://www.debian.org/security/2007/dsa-1371 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200705-16.xml - | |
References | () http://www.nabble.com/Important-UpLoad-security-fix%21-was--Fwd%3A--phpwiki---Open-Discussion--RE%3A-upload-security-risk--t3543463.html - | |
References | () https://sourceforge.net/forum/message.php?msg_id=4249177 - |
Information
Published : 2007-04-13 18:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-2025
Mitre link : CVE-2007-2025
CVE.ORG link : CVE-2007-2025
JSON object : View
Products Affected
phpwiki
- phpwiki
CWE