// For flags

CVE-2012-4472

 

Severity Score

5.1
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unrestricted file upload vulnerability in upload.php in the Drag & Drop Gallery module 6.x-1.5 and earlier for Drupal allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension followed by a safe extension, then accessing it via a direct request to the directory specified by the filedir parameter.

Una vulnerabilidad de subida de archivos sin restriccionesen en upload.php en el módulo Drag & Drop Gallery v6.x-1.5 y anteriores para Drupal permite a atacantes remotos ejecutar código PHP de su elección mediante la carga de un archivo con extensión ejecutable seguido de una extensión segura, para a continuación acceder al mismo mediante una solicitud directa al directorio especificado por el parámetro filedir.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-08-21 CVE Reserved
  • 2012-11-30 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
David Alkire
Search vendor "David Alkire"
Drag \& Drop Gallery
Search vendor "David Alkire" for product "Drag \& Drop Gallery"
<= 6.x-1.5
Search vendor "David Alkire" for product "Drag \& Drop Gallery" and version " <= 6.x-1.5"
-
Affected
in Drupal
Search vendor "Drupal"
Drupal
Search vendor "Drupal" for product "Drupal"
--
Safe