Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/116469 - | |
References | () http://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html - Exploit | |
References | () http://www.exploit-db.com/exploits/35424 - Exploit | |
References | () http://www.exploit-db.com/exploits/35660 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/99548 - |
Information
Published : 2015-01-07 18:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9567
Mitre link : CVE-2014-9567
CVE.ORG link : CVE-2014-9567
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')