phplist *connector.php* File Extension Validation Vulnerability

Posted on Tuesday, October 28, 2008 @ 19:27:38 PDT in Security
by Raven

SECUNIA ADVISORY ID: SA32439

VERIFY ADVISORY: http://secunia.com/advisories/32439/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/

DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.

The vulnerability is caused due to the "admin/FCKeditor/editor/filemanager/browser/default/connectors/phplist/connector.php" script improperly validating the extensions of uploaded files. This can potentially be exploited to upload files containing malicious file extensions and e.g. execute arbitrary PHP code. Successful exploitation requires valid administrator credentials.

SOLUTION: Update to version 2.10.7.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=636287
 
 
click Related        click Share
 
News ©

Site Info v2.2.2

Server TrafficServer Traffic
  • Total: 352,640,042
  • Today: 29,999
Server InfoServer Info
  • Apr 20, 2018
  • 07:35 am PDT
 
 

Daily Inspiration