CVE-2007-5156

Incomplete blacklist vulnerability in editor/filemanager/upload/php/upload.php in FCKeditor, as used in SiteX CMS 0.7.3.beta, La-Nai CMS, Syntax CMS, Cardinal Cms, and probably other products, allows remote attackers to upload and execute arbitrary PHP code via a file whose name contains ".php." and has an unknown extension, which is recognized as a .php file by the Apache HTTP server, a different vulnerability than CVE-2006-0658 and CVE-2006-2529.
References
Link Resource
http://dev.fckeditor.net/changeset/973 Vendor Advisory
http://dev.fckeditor.net/ticket/1325 Vendor Advisory
http://downloads.securityfocus.com/vulnerabilities/exploits/30677.php Broken Link
http://secunia.com/advisories/27123 Third Party Advisory
http://secunia.com/advisories/27174 Third Party Advisory
http://securityreason.com/securityalert/3182 Exploit Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=743930 Broken Link
http://sourceforge.net/project/shownotes.php?release_id=546000 Broken Link
http://www.securityfocus.com/archive/1/480830/100/0/threaded Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29422 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30677 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3464 Third Party Advisory
http://www.vupen.com/english/advisories/2007/3465 Third Party Advisory
http://www.waraxe.us/advisory-57.html Exploit Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42425 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/42733 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/44455 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5618 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5688 Exploit Third Party Advisory VDB Entry
http://dev.fckeditor.net/changeset/973 Vendor Advisory
http://dev.fckeditor.net/ticket/1325 Vendor Advisory
http://downloads.securityfocus.com/vulnerabilities/exploits/30677.php Broken Link
http://secunia.com/advisories/27123 Third Party Advisory
http://secunia.com/advisories/27174 Third Party Advisory
http://securityreason.com/securityalert/3182 Exploit Third Party Advisory
http://sourceforge.net/forum/forum.php?forum_id=743930 Broken Link
http://sourceforge.net/project/shownotes.php?release_id=546000 Broken Link
http://www.securityfocus.com/archive/1/480830/100/0/threaded Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/29422 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30677 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3464 Third Party Advisory
http://www.vupen.com/english/advisories/2007/3465 Third Party Advisory
http://www.waraxe.us/advisory-57.html Exploit Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/42425 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/42733 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/44455 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5618 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/5688 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cardinal_cms_project:cardinal_cms:1.2:*:*:*:*:*:*:*
cpe:2.3:a:redlinesoft:lanai_cms:*:*:*:*:*:*:*:*
cpe:2.3:a:sitex_cms_project:sitex_cms:0.7.3:beta:*:*:*:*:*:*
cpe:2.3:a:syntax_cms_project:syntax_cms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:37

Type Values Removed Values Added
References () http://dev.fckeditor.net/changeset/973 - Vendor Advisory () http://dev.fckeditor.net/changeset/973 - Vendor Advisory
References () http://dev.fckeditor.net/ticket/1325 - Vendor Advisory () http://dev.fckeditor.net/ticket/1325 - Vendor Advisory
References () http://downloads.securityfocus.com/vulnerabilities/exploits/30677.php - Broken Link () http://downloads.securityfocus.com/vulnerabilities/exploits/30677.php - Broken Link
References () http://secunia.com/advisories/27123 - Third Party Advisory () http://secunia.com/advisories/27123 - Third Party Advisory
References () http://secunia.com/advisories/27174 - Third Party Advisory () http://secunia.com/advisories/27174 - Third Party Advisory
References () http://securityreason.com/securityalert/3182 - Exploit, Third Party Advisory () http://securityreason.com/securityalert/3182 - Exploit, Third Party Advisory
References () http://sourceforge.net/forum/forum.php?forum_id=743930 - Broken Link () http://sourceforge.net/forum/forum.php?forum_id=743930 - Broken Link
References () http://sourceforge.net/project/shownotes.php?release_id=546000 - Broken Link () http://sourceforge.net/project/shownotes.php?release_id=546000 - Broken Link
References () http://www.securityfocus.com/archive/1/480830/100/0/threaded - Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/480830/100/0/threaded - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/29422 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/29422 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/30677 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/30677 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/3464 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/3464 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2007/3465 - Third Party Advisory () http://www.vupen.com/english/advisories/2007/3465 - Third Party Advisory
References () http://www.waraxe.us/advisory-57.html - Exploit, Third Party Advisory () http://www.waraxe.us/advisory-57.html - Exploit, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42425 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/42425 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42733 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/42733 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44455 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/44455 - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/5618 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/5618 - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/5688 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/5688 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2007-10-01 05:17

Updated : 2024-11-21 00:37


NVD link : CVE-2007-5156

Mitre link : CVE-2007-5156

CVE.ORG link : CVE-2007-5156


JSON object : View

Products Affected

syntax_cms_project

  • syntax_cms

cardinal_cms_project

  • cardinal_cms

redlinesoft

  • lanai_cms

sitex_cms_project

  • sitex_cms