A File Inclusion vulnerability exists in Railo 4.2.1 and earlier via a specially-crafted URL request to the thumbnail.cfm to specify a malicious PNG file, which could let a remote malicious user obtain sensitive information or execute arbitrary code.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
http://www.exploit-db.com/exploits/34669 | Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95959 | Third Party Advisory VDB Entry |
https://vulmon.com/vulnerabilitydetails?qid=CVE-2014-5468 | Third Party Advisory |
https://www.securityfocus.com/bid/69761 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2020-02-07 17:15
Updated : 2024-02-04 20:39
NVD link : CVE-2014-5468
Mitre link : CVE-2014-5468
CVE.ORG link : CVE-2014-5468
JSON object : View
Products Affected
getrailo
- railo
CWE
CWE-20
Improper Input Validation