FileUploadsFilter.php in X2Engine 4.1.7 and earlier, when running on case-insensitive file systems, allows remote attackers to bypass the upload blacklist and conduct unrestricted file upload attacks by uploading a file with an executable extension that contains uppercase letters, as demonstrated using a PHP program.
References
Configurations
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://karmainsecurity.com/KIS-2014-10 - | |
References | () http://packetstormsecurity.com/files/128353/X2Engine-4.1.7-Unrestricted-File-Upload.html - | |
References | () http://seclists.org/fulldisclosure/2014/Sep/78 - | |
References | () http://www.securityfocus.com/archive/1/533514/100/0/threaded - | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf - | |
References | () https://github.com/X2Engine/X2Engine/blob/master/CHANGELOG.md - |
Information
Published : 2014-10-10 01:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5298
Mitre link : CVE-2014-5298
CVE.ORG link : CVE-2014-5298
JSON object : View
Products Affected
x2engine
- x2engine
CWE
CWE-264
Permissions, Privileges, and Access Controls