Page 3 of 12 results (0.001 seconds)

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

manageuser.php in Collabtive before 0.7.6 allows remote authenticated users, and possibly unauthenticated attackers, to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg, then accessing it via a direct request to the file in files/standard/avatar. manageuser.php en Collabtive anteriores a v0.7.6 permite a usuarios remotos autenticados, y posiblemente a los atacantes no autenticados, eludir las restricciones de acceso previstas, y subir y ejecutar archivos arbitrarios mediante la subida de un archivo de avatar con un Content-Type validado como image/jpeg, para a continuación, acceder a a través de una solicitud directa al archivo en /standard/avatar. • http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html http://www.collabtive.o-dyn.de/blog/?p=426 http://www.openwall.com/lists/oss-security/2012/06/06/6 http://www.openwall.com/lists/oss-security/2012/06/06/9 http://www.securityfocus.com/archive/1/522973/30/0/threaded http://www.securityfocus.com/bid/53813 http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html https://exchange.xforce.ibmcloud.com/vulnerabilities/76101 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in managechat.php in Collabtive 0.65 allows remote attackers to execute arbitrary SQL commands via the chatstart[USERTOID] cookie in a pull action. Vulnerabilidad de inyección SQL en managechat.php en Collabtive v0.65, permite a atacantes remotos ejecutar comandos SQL de su elección a través de la cookie chatstart[USERTOID]en una acción pull. • https://www.exploit-db.com/exploits/15381 http://packetstormsecurity.org/1011-exploits/collabtive065-sql.txt http://www.exploit-db.com/exploits/15381 https://exchange.xforce.ibmcloud.com/vulnerabilities/62930 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •