CVE-2014-8085

Unrestricted file upload vulnerability in the CWebContact::doModel method in oc-includes/osclass/controller/contact.php in OSClass before 3.4.3 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in an unspecified directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osclass:osclass:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:18

Type Values Removed Values Added
References () http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/ - () http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/ -
References () http://karmainsecurity.com/KIS-2014-16 - () http://karmainsecurity.com/KIS-2014-16 -
References () http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html - () http://packetstormsecurity.com/files/129777/Osclass-3.4.2-Shell-Upload.html -
References () http://seclists.org/fulldisclosure/2014/Dec/134 - () http://seclists.org/fulldisclosure/2014/Dec/134 -
References () http://www.securityfocus.com/archive/1/534361/100/0/threaded - () http://www.securityfocus.com/archive/1/534361/100/0/threaded -
References () http://www.securityfocus.com/bid/71842 - () http://www.securityfocus.com/bid/71842 -

Information

Published : 2015-01-05 20:59

Updated : 2025-04-12 10:46


NVD link : CVE-2014-8085

Mitre link : CVE-2014-8085

CVE.ORG link : CVE-2014-8085


JSON object : View

Products Affected

osclass

  • osclass