Unrestricted file upload vulnerability in TomatoCMS 2.0.6 and earlier allows remote authenticated users, with certain privileges, to execute arbitrary PHP code by uploading an image file, and then accessing it via a direct request to the file in an unspecified directory.
References
Link | Resource |
---|---|
http://holisticinfosec.org/content/view/148/45/ | |
http://secunia.com/advisories/39680 | Vendor Advisory |
http://secunia.com/secunia_research/2010-57/ | Vendor Advisory |
http://www.securityfocus.com/bid/40544 | |
http://holisticinfosec.org/content/view/148/45/ | |
http://secunia.com/advisories/39680 | Vendor Advisory |
http://secunia.com/secunia_research/2010-57/ | Vendor Advisory |
http://www.securityfocus.com/bid/40544 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://holisticinfosec.org/content/view/148/45/ - | |
References | () http://secunia.com/advisories/39680 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2010-57/ - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/40544 - |
Information
Published : 2010-06-15 14:30
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1514
Mitre link : CVE-2010-1514
CVE.ORG link : CVE-2010-1514
JSON object : View
Products Affected
tomatocms
- tomatocms
CWE