Unrestricted file upload vulnerability in op/op.AddFile2.php in SeedDMS (formerly LetoDMS and MyDMS) before 4.3.4 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the partitionIndex parameter and leveraging CVE-2014-2279.2 to access it via the directory specified by the fileId parameter.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2014-03/0101.html - | |
References | () http://osvdb.org/show/osvdb/104465 - | |
References | () http://packetstormsecurity.com/files/125726 - | |
References | () http://secunia.com/advisories/57475 - | |
References | () http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG - Vendor Advisory |
Information
Published : 2014-10-17 23:55
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2278
Mitre link : CVE-2014-2278
CVE.ORG link : CVE-2014-2278
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-20
Improper Input Validation