Ravens PHP Scripts

phplist *connector.php* File Extension Validation Vulnerability
Date: Tuesday, October 28, 2008 @ 19:27:38 CET
Topic: Security


VERIFY ADVISORY: http://secunia.com/advisories/32439/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/

DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.

The vulnerability is caused due to the "admin/FCKeditor/editor/filemanager/browser/default/connectors/phplist/connector.php" script improperly validating the extensions of uploaded files. This can potentially be exploited to upload files containing malicious file extensions and e.g. execute arbitrary PHP code. Successful exploitation requires valid administrator credentials.

SOLUTION: Update to version 2.10.7.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=636287

This article comes from Ravens PHP Scripts

The URL for this story is: