CVE-2014-2278

Unrestricted file upload vulnerability in op/op.AddFile2.php in SeedDMS (formerly LetoDMS and MyDMS) before 4.3.4 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the partitionIndex parameter and leveraging CVE-2014-2279.2 to access it via the directory specified by the fileId parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2014-03/0101.html - () http://archives.neohapsis.com/archives/bugtraq/2014-03/0101.html -
References () http://osvdb.org/show/osvdb/104465 - () http://osvdb.org/show/osvdb/104465 -
References () http://packetstormsecurity.com/files/125726 - () http://packetstormsecurity.com/files/125726 -
References () http://secunia.com/advisories/57475 - () http://secunia.com/advisories/57475 -
References () http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG - Vendor Advisory () http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG - Vendor Advisory

Information

Published : 2014-10-17 23:55

Updated : 2024-11-21 02:05


NVD link : CVE-2014-2278

Mitre link : CVE-2014-2278

CVE.ORG link : CVE-2014-2278


JSON object : View

Products Affected

seeddms

  • seeddms
CWE
CWE-20

Improper Input Validation