Unrestricted file upload vulnerability in repository/repository_attachment.php in AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in ossiminstall/uploads/.
References
Link | Resource |
---|---|
http://secunia.com/advisories/37727 | Vendor Advisory |
http://www.alienvault.com/community.php?section=News | Vendor Advisory |
http://www.cybsec.com/vuln/OSSIM_2_1_5%20_Arbitrary_File_Upload.pdf | Exploit |
http://secunia.com/advisories/37727 | Vendor Advisory |
http://www.alienvault.com/community.php?section=News | Vendor Advisory |
http://www.cybsec.com/vuln/OSSIM_2_1_5%20_Arbitrary_File_Upload.pdf | Exploit |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/37727 - Vendor Advisory | |
References | () http://www.alienvault.com/community.php?section=News - Vendor Advisory | |
References | () http://www.cybsec.com/vuln/OSSIM_2_1_5%20_Arbitrary_File_Upload.pdf - Exploit |
Information
Published : 2009-12-21 16:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4373
Mitre link : CVE-2009-4373
CVE.ORG link : CVE-2009-4373
JSON object : View
Products Affected
alienvault
- open_source_security_information_management
CWE