WalRack 1.x before 1.1.9 and 2.x before 2.0.7 does not properly restrict file uploads, which allows remote attackers to execute arbitrary PHP code via vectors involving a double extension, as demonstrated by a .php.zzz file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://digit.que.ne.jp/work/index.cgi?WalRack - Patch | |
References | () http://digit.que.ne.jp/work/index.cgi?WalRack2 - Patch | |
References | () http://jvn.jp/en/jp/JVN46984044/54827/index.html - | |
References | () http://jvn.jp/en/jp/JVN46984044/index.html - | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2011-000032 - | |
References | () http://www.securityfocus.com/bid/48001 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/67641 - |
Information
Published : 2011-05-31 20:55
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1329
Mitre link : CVE-2011-1329
CVE.ORG link : CVE-2011-1329
JSON object : View
Products Affected
walrus_digit
- walrack
CWE
CWE-264
Permissions, Privileges, and Access Controls