phplist *connector.php* File Extension Validation Vulnerability

Posted on Tuesday, October 28, 2008 @ 18:27:38 CET in Security
by Raven

SECUNIA ADVISORY ID: SA32439

VERIFY ADVISORY: http://secunia.com/advisories/32439/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/

DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.

The vulnerability is caused due to the "admin/FCKeditor/editor/filemanager/browser/default/connectors/phplist/connector.php" script improperly validating the extensions of uploaded files. This can potentially be exploited to upload files containing malicious file extensions and e.g. execute arbitrary PHP code. Successful exploitation requires valid administrator credentials.

SOLUTION: Update to version 2.10.7.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=636287
 
 
click Related        click Share
 
News ©

Site Info

Last SeenLast Seen
  • FireATST
  • Doulos
Server TrafficServer Traffic
  • Total: 400,682,414
  • Today: 35,498
Server InfoServer Info
  • Apr 02, 2020
  • 07:42 pm CEST