Unrestricted file upload vulnerability in plog-admin/plog-upload.php in Plogger 1.0 RC1 and earlier allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file and a non-zero length PNG file, then accessing the PHP file via a direct request to it in plog-content/uploads/archive/.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html - Exploit | |
References | () http://seclists.org/oss-sec/2014/q1/443 - | |
References | () http://seclists.org/oss-sec/2014/q1/446 - Exploit | |
References | () http://www.exploit-db.com/exploits/34447 - Exploit | |
References | () https://www.sysdream.com/CVE-2014-2223_CVE-2014-2224 - | |
References | () https://www.sysdream.com/system/files/PLOGGER-1.0RC1-advisory.pdf - Exploit |
Information
Published : 2014-09-11 14:16
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2223
Mitre link : CVE-2014-2223
CVE.ORG link : CVE-2014-2223
JSON object : View
Products Affected
plogger
- plogger
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')