PivotX before 2.3.11 does not validate the new file extension when renaming a file with multiple extensions, which allows remote attackers to execute arbitrary code by uploading a crafted file, as demonstrated by a file named foo.php.php.
References
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.pivotx.net/archive/2015/06/21/pivotx-2311-released - | |
References | () http://packetstormsecurity.com/files/132474/PivotX-2.3.10-Session-Fixation-XSS-Code-Execution.html - Exploit | |
References | () http://software-talk.org/blog/2015/06/session-fixation-xss-code-execution-vulnerability-pivotx/ - Exploit | |
References | () http://sourceforge.net/p/pivot-weblog/code/4452/tree//branches/2.3.x/pivotx/fileupload.php?diff=51a4cb5e34309d75c0d1612a:4451 - | |
References | () http://www.securityfocus.com/archive/1/535860/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/75577 - |
Information
Published : 2015-07-08 15:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5457
Mitre link : CVE-2015-5457
CVE.ORG link : CVE-2015-5457
JSON object : View
Products Affected
pivotx
- pivotx
CWE
CWE-20
Improper Input Validation