Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-7271 | An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Havalite
Havalite cms |
|
| Vendors & Products |
Havalite
Havalite cms |
Fri, 01 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated arbitrary file upload vulnerability exists in Havalite CMS version 1.1.7 (and possibly earlier) in the upload.php script. The application fails to enforce proper file extension validation and authentication checks, allowing remote attackers to upload malicious PHP files via a crafted multipart/form-data POST request. Once uploaded, the attacker can access the file directly under havalite/tmp/files/, resulting in remote code execution. | |
| Title | Havalite CMS Arbitary File Upload RCE | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-04T14:20:18.341Z
Reserved: 2025-08-01T15:44:15.616Z
Link: CVE-2013-10055
Updated: 2025-08-04T14:20:13.404Z
Status : Awaiting Analysis
Published: 2025-08-01T21:15:27.473
Modified: 2025-08-04T15:15:30.477
Link: CVE-2013-10055
No data.
OpenCVE Enrichment
Updated: 2025-08-04T08:49:32Z
EUVD