Page 2 of 6 results (0.002 seconds)

CVSS: 7.5EPSS: 7%CPEs: 5EXPL: 1

Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled. Vulnerabilidad de subida de fichero no restringido en el editor de ficheros mcpuk (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) en Achievo 1.2.0 hasta 1.3.2, permite a atacantes remotos ejecutar código de su elección al subir un fichero con .php seguido de una extensión segura y luego accediendo a él mediante una solicitud directa al fichero del directorio raíz de Achievo. NOTA: Se trata sólo es una vulnerabilidad en entornos que soportan múltiples extensiones como Apache con el módulo mod_mime habilitado. • https://www.exploit-db.com/exploits/5770 http://secunia.com/advisories/30597 http://www.achievo.org/blog/archives/631-Achievo-1.3.3-Security-Release.html http://www.securityfocus.com/bid/29621 https://exchange.xforce.ibmcloud.com/vulnerabilities/42980 • CWE-20: Improper Input Validation •