CVE-2006-2330

high

Description

PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/26388

http://www.vupen.com/english/advisories/2006/1735

http://www.securityfocus.com/archive/1/433277/100/0/threaded

http://www.php-fusion.co.uk/news.php

http://www.osvdb.org/25537

http://securityreason.com/securityalert/873

http://secunia.com/advisories/19992

Details

Source: Mitre, NVD

Published: 2006-05-12

Updated: 2018-10-18

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High