Description
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-4166 | The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T02:46:48.091Z
Reserved: 2005-12-11T00:00:00.000Z
Link: CVE-2005-4171
No data.
Status : Deferred
Published: 2005-12-11T21:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-4171
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD