Incomplete blacklist vulnerability in javaUpload.php in Postlet in the FileManager module in CMS Made Simple 1.2.4 and earlier allows remote attackers to execute arbitrary code by uploading a file with a name ending in (1) .jsp, (2) .php3, (3) .cgi, (4) .dhtml, (5) .phtml, (6) .php5, or (7) .jar, then accessing it via a direct request to the file in modules/FileManager/postlet/.
References
Configurations
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.cmsmadesimple.org/2008/05/12/announcing-cms-made-simple-125/ - | |
References | () http://secunia.com/advisories/30208 - Vendor Advisory | |
References | () http://www.attrition.org/pipermail/vim/2008-May/001978.html - | |
References | () http://www.securityfocus.com/bid/29170 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42371 - | |
References | () https://www.exploit-db.com/exploits/5600 - |
Information
Published : 2008-05-16 12:54
Updated : 2025-04-09 00:30
NVD link : CVE-2008-2267
Mitre link : CVE-2008-2267
CVE.ORG link : CVE-2008-2267
JSON object : View
Products Affected
cms_made_simple
- cms_made_simple
CWE
CWE-20
Improper Input Validation