| VID |
21767 |
| Severity |
40 |
| Port |
80, ¡¦ |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The RunCMS / E-Xoops, according to its version number, has a remote arbitrary file upload vulnerability. RunCMS / E-Xoops is a freely available community management system written in PHP, developed from XOOPS. RUNCMS version 1.1A and earlier versions, and possibly other products based on E-Xoops could allow arbitrary files to be uploaded, caused due to an input validation error in the file upload function. If the Allow customer avatar upload option is enabled, a remote attacker could exploit this vulnerability to upload arbitrary files and to gain unauthorized access in the context of the Web server.
* Note: This check solely relied on the version number of RunCMS / E-Xoops installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/395097 http://secunia.com/advisories/14869/
* Platforms Affected: E-Xoops version 1.0 5r3 RUNCMS version 1.1A and earlier versions Any operating system Any version |
| Recommendation |
Set the 'Allow custom avatar upload' option to 'No' in 'Custom avatar settings'.
-- OR --
Apply the patch for this vulnerability, available from the RunCMS Web site at http://www.runcms.org/modules/mydownloads/singlefile.php?lid=219 |
| Related URL |
CVE-2005-1031 (CVE) |
| Related URL |
13027 (SecurityFocus) |
| Related URL |
20001 (ISS) |
|