manageuser.php in Collabtive before 0.7.6 allows remote authenticated users, and possibly unauthenticated attackers, to bypass intended access restrictions and upload and execute arbitrary files by uploading an avatar file with an accepted Content-Type such as image/jpeg, then accessing it via a direct request to the file in files/standard/avatar.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-06/0007.html - | |
References | () http://www.collabtive.o-dyn.de/blog/?p=426 - | |
References | () http://www.openwall.com/lists/oss-security/2012/06/06/6 - | |
References | () http://www.openwall.com/lists/oss-security/2012/06/06/9 - | |
References | () http://www.securityfocus.com/archive/1/522973/30/0/threaded - | |
References | () http://www.securityfocus.com/bid/53813 - | |
References | () http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/76101 - |
Information
Published : 2012-06-17 03:41
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2670
Mitre link : CVE-2012-2670
CVE.ORG link : CVE-2012-2670
JSON object : View
Products Affected
o-dyn
- collabtive
CWE
CWE-20
Improper Input Validation