PivotX before 2.3.11 does not validate the new file extension when renaming a file with multiple extensions, which allows remote attackers to execute arbitrary code by uploading a crafted file, as demonstrated by a file named foo.php.php.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://blog.pivotx.net/archive/2015/06/21/pivotx-2311-released - | |
| References | () http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html - Exploit | |
| References | () http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/ - Exploit | |
| References | () http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451 - | |
| References | () http://www.securityfocus.com/archive/1/535860/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/75577 - | 
Information
                Published : 2015-07-08 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-5457
Mitre link : CVE-2015-5457
CVE.ORG link : CVE-2015-5457
JSON object : View
Products Affected
                pivotx
- pivotx
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
