Korean
<< Back
VID 21767
Severity 40
Port 80, ¡¦
Protocol TCP
Class CGI
Detailed Description The RunCMS / E-Xoops, according to its version number, has a remote arbitrary file upload vulnerability. RunCMS / E-Xoops is a freely available community management system written in PHP, developed from XOOPS. RUNCMS version 1.1A and earlier versions, and possibly other products based on E-Xoops could allow arbitrary files to be uploaded, caused due to an input validation error in the file upload function. If the Allow customer avatar upload option is enabled, a remote attacker could exploit this vulnerability to upload arbitrary files and to gain unauthorized access in the context of the Web server.

* Note: This check solely relied on the version number of RunCMS / E-Xoops installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/395097
http://secunia.com/advisories/14869/

* Platforms Affected:
E-Xoops version 1.0 5r3
RUNCMS version 1.1A and earlier versions
Any operating system Any version
Recommendation Set the 'Allow custom avatar upload' option to 'No' in 'Custom avatar settings'.

-- OR --

Apply the patch for this vulnerability, available from the RunCMS Web site at http://www.runcms.org/modules/mydownloads/singlefile.php?lid=219
Related URL CVE-2005-1031 (CVE)
Related URL 13027 (SecurityFocus)
Related URL 20001 (ISS)