CVE-2007-4182

Unrestricted file upload vulnerability in index.php in WikiWebWeaver 1.1 and earlier allows remote attackers to upload and execute arbitrary PHP code via an upload action specifying a filename with a double extension such as .gif.php, which is accessible from data/documents/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wikiwebweaver:wikiwebweaver:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://securityreason.com/securityalert/2972 - () http://securityreason.com/securityalert/2972 -
References () http://www.securityfocus.com/archive/1/475242/100/0/threaded - () http://www.securityfocus.com/archive/1/475242/100/0/threaded -
References () http://www.securityfocus.com/bid/25164 - () http://www.securityfocus.com/bid/25164 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/35736 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/35736 -

Information

Published : 2007-08-08 01:17

Updated : 2025-04-09 00:30


NVD link : CVE-2007-4182

Mitre link : CVE-2007-4182

CVE.ORG link : CVE-2007-4182


JSON object : View

Products Affected

wikiwebweaver

  • wikiwebweaver