Korean
<< Back
VID 21620
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The e107 Website System, according to its version number, has a file upload vulnerability in the images.php script. e107 is a freely available, Web content management system written in PHP. e107 version 0.616 and earlier versions could allow a remote attacker to upload arbitrary files on the affected host. The problem is that images with arbitrary file extensions can be uploaded via the Image Manager in "images.php" script. This can be exploited to upload malicious script files (e.g. PHP scripts) inside the web root. A remote attacker could exploit this vulnerability by uploading malicious PHP files to execute arbitrary code in the context of the Web server.

* Note: This check solely relied on the version number of e107 installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://e107.org/comment.php?comment.news.672
http://securitytracker.com/alerts/2004/Dec/1012657.html
http://secunia.com/advisories/13657/

* Platforms Affected:
e107 version 0.616 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of e107 (0.617 or later), available from the e107 Web page at http://www.e107.org
Related URL CVE-2004-2262 (CVE)
Related URL 12111 (SecurityFocus)
Related URL 18670 (ISS)