views/upload.php in the ProJoom Smart Flash Header (NovaSFH) component 3.0.2 and earlier for Joomla! allows remote attackers to upload and execute arbitrary files via a crafted (1) dest parameter and (2) arbitrary extension in the Filename parameter.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/91020 | Third Party Advisory VDB Entry |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1214/ | Exploit Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91020 | Third Party Advisory VDB Entry |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1214/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/91020 - Third Party Advisory, VDB Entry | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-1214/ - Exploit, Third Party Advisory |
Information
Published : 2019-11-13 21:15
Updated : 2024-11-21 02:03
NVD link : CVE-2014-1214
Mitre link : CVE-2014-1214
CVE.ORG link : CVE-2014-1214
JSON object : View
Products Affected
projoom
- smart_flash_header
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type