Ravens PHP Scripts

phplist *connector.php* File Extension Validation Vulnerability
Date: Tuesday, October 28, 2008 @ 19:27:38 PDT
Topic: Security


SECUNIA ADVISORY ID: SA32439

VERIFY ADVISORY: http://secunia.com/advisories/32439/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/

DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.



The vulnerability is caused due to the "admin/FCKeditor/editor/filemanager/browser/default/connectors/phplist/connector.php" script improperly validating the extensions of uploaded files. This can potentially be exploited to upload files containing malicious file extensions and e.g. execute arbitrary PHP code. Successful exploitation requires valid administrator credentials.

SOLUTION: Update to version 2.10.7.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=636287






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=3484