3 results (0.024 seconds)

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 1

Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) .phtml extension. Múltiples vulnerabilidades de lista negra incompletas en la funcionalidad de carga de avatar en el archivo manageuser.php en Collabtive versiones anteriores a 2.1, permiten a los usuarios autenticados remotos ejecutar código arbitrario mediante la carga de un archivo con una extensión (1) .php3, (2) .php4, (3) .php5 o (4) .phtml. Collabtive version 2.0 suffers from an arbitrary file upload vulnerability. • http://packetstormsecurity.com/files/133736/Collabtive-2.0-Shell-Upload.html https://github.com/philippK-de/Collabtive/commit/9ce6301583669d0a8ecb4d23fb56e34b68511335 https://lists.debian.org/debian-lts-announce/2020/02/msg00031.html https://usn.ubuntu.com/4590-1 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 26EXPL: 5

SQL injection vulnerability in managetimetracker.php in Collabtive before 1.2 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a projectpdf action. Vulnerabilidad de inyección de SQL en managetimetracker.php de Collabtive anterior a la versión 1.2 permite a usuarios autenticados ejecutar comandos SQL arbitrarios a través del parámetro id en una acción projectpdf. Collabtive version 1.1 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/30946 http://osvdb.org/102123 http://packetstormsecurity.com/files/124777/Collabtive-1.1-SQL-Injection.html http://seclists.org/fulldisclosure/2014/Jan/72 http://www.collabtive.o-dyn.de/blog/?p=621#more-621 http://www.exploit-db.com/exploits/30946 http://www.securityfocus.com/bid/64943 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

manageuser.php in Collabtive before 0.7.6 allows remote authenticated users, and possibly unauthenticated attackers, to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg, then accessing it via a direct request to the file in files/standard/avatar. manageuser.php en Collabtive anteriores a v0.7.6 permite a usuarios remotos autenticados, y posiblemente a los atacantes no autenticados, eludir las restricciones de acceso previstas, y subir y ejecutar archivos arbitrarios mediante la subida de un archivo de avatar con un Content-Type validado como image/jpeg, para a continuación, acceder a a través de una solicitud directa al archivo en /standard/avatar. • http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html http://www.collabtive.o-dyn.de/blog/?p=426 http://www.openwall.com/lists/oss-security/2012/06/06/6 http://www.openwall.com/lists/oss-security/2012/06/06/9 http://www.securityfocus.com/archive/1/522973/30/0/threaded http://www.securityfocus.com/bid/53813 http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html https://exchange.xforce.ibmcloud.com/vulnerabilities/76101 • CWE-20: Improper Input Validation •