Unrestricted file upload vulnerability in webadmin/ajaxfilemanager/ajaxfilemanager.php in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote authenticated users with admin privileges on the Cloud Manager web console to execute arbitrary PHP code by uploading a file with a double extension, then accessing it via a direct request to the file in webadmin/deny/images/, as demonstrated by secuid0.php.gif.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/37932/ | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/37932/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html - Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/37932/ - Third Party Advisory, VDB Entry |
Information
Published : 2017-09-19 15:29
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9619
Mitre link : CVE-2014-9619
CVE.ORG link : CVE-2014-9619
JSON object : View
Products Affected
netsweeper
- netsweeper
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type