html/index.php in TorrentFlux 2.3 allows remote authenticated users to execute arbitrary code via a URL with a file containing an executable extension in the url_upload parameter, which is downloaded by TorrentFlux and can be accessed via a direct request in a html/downloads/ user directory.
References
Configurations
History
21 Nov 2024, 00:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/44645 - | |
References | () http://secunia.com/advisories/29935 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/491066/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28846 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41925 - |
Information
Published : 2009-04-03 18:30
Updated : 2024-11-21 00:56
NVD link : CVE-2008-6584
Mitre link : CVE-2008-6584
CVE.ORG link : CVE-2008-6584
JSON object : View
Products Affected
torrentflux
- torrentflux
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')