The Upload method in the RealPage Module Upload ActiveX control in Realpage.dll 1.0.0.9 in RealPage Module ActiveX Controls does not properly restrict certain property values, which allows remote attackers to read arbitrary files via a filename in the SourceFile property in conjunction with an http URL in the DestURL property.
References
Link | Resource |
---|---|
http://secunia.com/advisories/41392 | Vendor Advisory |
http://secunia.com/secunia_research/2010-118/ | Vendor Advisory |
http://www.osvdb.org/68813 | |
http://www.securityfocus.com/bid/44302 | |
http://secunia.com/advisories/41392 | Vendor Advisory |
http://secunia.com/secunia_research/2010-118/ | Vendor Advisory |
http://www.osvdb.org/68813 | |
http://www.securityfocus.com/bid/44302 |
Configurations
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41392 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2010-118/ - Vendor Advisory | |
References | () http://www.osvdb.org/68813 - | |
References | () http://www.securityfocus.com/bid/44302 - |
Information
Published : 2010-10-26 19:00
Updated : 2025-04-11 00:51
NVD link : CVE-2010-2584
Mitre link : CVE-2010-2584
CVE.ORG link : CVE-2010-2584
JSON object : View
Products Affected
realpage
- module_activex_controls
CWE
CWE-264
Permissions, Privileges, and Access Controls