6 results (0.003 seconds)

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 1

Multiple incomplete blacklist vulnerabilities in the avatar upload functionality in manageuser.php in Collabtive before 2.1 allow remote authenticated users to execute arbitrary code by uploading a file with a (1) .php3, (2) .php4, (3) .php5, or (4) .phtml extension. Múltiples vulnerabilidades de lista negra incompletas en la funcionalidad de carga de avatar en el archivo manageuser.php en Collabtive versiones anteriores a 2.1, permiten a los usuarios autenticados remotos ejecutar código arbitrario mediante la carga de un archivo con una extensión (1) .php3, (2) .php4, (3) .php5 o (4) .phtml. Collabtive version 2.0 suffers from an arbitrary file upload vulnerability. • http://packetstormsecurity.com/files/133736/Collabtive-2.0-Shell-Upload.html https://github.com/philippK-de/Collabtive/commit/9ce6301583669d0a8ecb4d23fb56e34b68511335 https://lists.debian.org/debian-lts-announce/2020/02/msg00031.html https://usn.ubuntu.com/4590-1 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.5EPSS: 0%CPEs: 26EXPL: 5

SQL injection vulnerability in managetimetracker.php in Collabtive before 1.2 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a projectpdf action. Vulnerabilidad de inyección de SQL en managetimetracker.php de Collabtive anterior a la versión 1.2 permite a usuarios autenticados ejecutar comandos SQL arbitrarios a través del parámetro id en una acción projectpdf. Collabtive version 1.1 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/30946 http://osvdb.org/102123 http://packetstormsecurity.com/files/124777/Collabtive-1.1-SQL-Injection.html http://seclists.org/fulldisclosure/2014/Jan/72 http://www.collabtive.o-dyn.de/blog/?p=621#more-621 http://www.exploit-db.com/exploits/30946 http://www.securityfocus.com/bid/64943 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Multiple cross-site scripting (XSS) vulnerabilities in Collabtive 0.6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) User parameter in the edit user profile feature to manageuser.php, (2) y parameter in a newcal action to manageajax.php, and the (3) pic parameter to thumb.php. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en Collabtive versión 0.6.5, permiten a los atacantes remotos inyectar script web o HTML arbitrario por medio del (1) parámetro User en la funcionalidad edit user profile en el archivo manageuser.php, (2) parámetro y en una acción newcal en el archivo manageajax.php, y (3) parámetro pic en el archivo thumb.php. • https://www.exploit-db.com/exploits/15240 http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt http://secunia.com/advisories/41805 http://www.anatoliasecurity.com/adv/as-adv-2010-003.txt http://www.exploit-db.com/exploits/15240 http://www.securityfocus.com/bid/44050 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 3

Cross-site request forgery (CSRF) vulnerability in admin.php in Collabtive 0.6.5 allows remote attackers to hijack the authentication of administrators for requests that add administrative users via the edituser action. Una vulnerabilidad de falsificación de peticiones en sitios cruzados (CSRF) en admin.php en Collabtive v0.6.5 permite a atacantes remotos secuestrar la autenticación de los administradores de las solicitudes que crean os usuarios administrativos a través de la acción editUser. • https://www.exploit-db.com/exploits/15240 http://packetstormsecurity.org/1010-exploits/collabtive-xssxsrf.txt http://secunia.com/advisories/41805 http://www.anatoliasecurity.com/adv/as-adv-2010-003.txt http://www.exploit-db.com/exploits/15240 http://www.securityfocus.com/bid/44050 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

manageuser.php in Collabtive before 0.7.6 allows remote authenticated users, and possibly unauthenticated attackers, to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg, then accessing it via a direct request to the file in files/standard/avatar. manageuser.php en Collabtive anteriores a v0.7.6 permite a usuarios remotos autenticados, y posiblemente a los atacantes no autenticados, eludir las restricciones de acceso previstas, y subir y ejecutar archivos arbitrarios mediante la subida de un archivo de avatar con un Content-Type validado como image/jpeg, para a continuación, acceder a a través de una solicitud directa al archivo en /standard/avatar. • http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html http://www.collabtive.o-dyn.de/blog/?p=426 http://www.openwall.com/lists/oss-security/2012/06/06/6 http://www.openwall.com/lists/oss-security/2012/06/06/9 http://www.securityfocus.com/archive/1/522973/30/0/threaded http://www.securityfocus.com/bid/53813 http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html https://exchange.xforce.ibmcloud.com/vulnerabilities/76101 • CWE-20: Improper Input Validation •