CVE-2008-2742 – Achievo 1.3.2 - 'FCKeditor' Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2008-2742
Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled. Vulnerabilidad de subida de fichero no restringido en el editor de ficheros mcpuk (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) en Achievo 1.2.0 hasta 1.3.2, permite a atacantes remotos ejecutar código de su elección al subir un fichero con .php seguido de una extensión segura y luego accediendo a él mediante una solicitud directa al fichero del directorio raíz de Achievo. NOTA: Se trata sólo es una vulnerabilidad en entornos que soportan múltiples extensiones como Apache con el módulo mod_mime habilitado. • https://www.exploit-db.com/exploits/5770 http://secunia.com/advisories/30597 http://www.achievo.org/blog/archives/631-Achievo-1.3.3-Security-Release.html http://www.securityfocus.com/bid/29621 https://exchange.xforce.ibmcloud.com/vulnerabilities/42980 • CWE-20: Improper Input Validation •
CVE-2007-2736 – Achievo 1.1.0 - 'config_atkroot' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-2736
PHP remote file inclusion vulnerability in index.php in Achievo 1.1.0 allows remote attackers to execute arbitrary PHP code via a URL in the config_atkroot parameter. Vulnerabilidad de inclusión remota de archivo en PHP en index.php de Achievo 1.1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro config_atkroot. • https://www.exploit-db.com/exploits/3928 http://osvdb.org/37919 http://www.securityfocus.com/bid/23992 https://exchange.xforce.ibmcloud.com/vulnerabilities/34305 •
CVE-2006-2688
https://notcve.org/view.php?id=CVE-2006-2688
SQL injection vulnerability in the employees node (class.employee.inc) in Achievo 1.1.0 and earlier and 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the atkselector parameter. • http://bugzilla.achievo.org/show_bug.cgi?id=624 http://secunia.com/advisories/20327 http://www.achievo.org/download/releasenotes/1_2_1 http://www.osvdb.org/25811 http://www.securityfocus.com/bid/18171 http://www.vupen.com/english/advisories/2006/2053 https://exchange.xforce.ibmcloud.com/vulnerabilities/26755 •
CVE-2002-1435 – Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution
https://notcve.org/view.php?id=CVE-2002-1435
class.atkdateattribute.js.php in Achievo 0.7.0 through 0.9.1, except 0.8.2, allows remote attackers to execute arbitrary PHP code when the 'allow_url_fopen' setting is enabled via a URL in the config_atkroot parameter that points to the code. class.atkdateattribute.js.php en Achievo 0.7.0 hasta 0.9.1 excepto 0.8.2, permite que atacantes remotos ejecuten código PHP arbitrario cuando la opción "allow_url_fopen" está establecida mediante URL en el parámetro config_atkroot que apunta al código. • https://www.exploit-db.com/exploits/21745 http://archives.neohapsis.com/archives/bugtraq/2002-08/0235.html http://www.achievo.org/lists/2002/Aug/msg00092.html http://www.iss.net/security_center/static/9947.php http://www.securityfocus.com/bid/5552 •