The file extension check in GNUBoard 3.40 and earlier only verifies extensions that contain all lowercase letters, which allows remote attackers to upload arbitrary files via file extensions that include uppercase letters.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=110477648219738&w=2 | Exploit Mailing List |
http://secunia.com/advisories/13711 | Broken Link |
http://www.securityfocus.com/bid/12149 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18729 | Third Party Advisory VDB Entry |
http://marc.info/?l=bugtraq&m=110477648219738&w=2 | Exploit Mailing List |
http://secunia.com/advisories/13711 | Broken Link |
http://www.securityfocus.com/bid/12149 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18729 | Third Party Advisory VDB Entry |
Configurations
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=110477648219738&w=2 - Exploit, Mailing List | |
References | () http://secunia.com/advisories/13711 - Broken Link | |
References | () http://www.securityfocus.com/bid/12149 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18729 - Third Party Advisory, VDB Entry |
02 Feb 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/12149 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=110477648219738&w=2 - Exploit, Mailing List | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/18729 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/13711 - Broken Link | |
CWE | CWE-178 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:sir:gnuboard:3.32:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.40:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.33:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.36:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.35:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.37:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.38:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.39:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.31:*:*:*:*:*:*:* cpe:2.3:a:sir:gnuboard:3.34:*:*:*:*:*:*:* |
cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:* |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0269
Mitre link : CVE-2005-0269
CVE.ORG link : CVE-2005-0269
JSON object : View
Products Affected
sir
- gnuboard
CWE
CWE-178
Improper Handling of Case Sensitivity