Vulnerability Description
betaparticle blog (bp blog), posisbly before version 4, allows remote attackers to bypass authentication and (1) upload files via a direct request to upload.asp or (2) delete files via a direct request to myFiles.asp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Betaparticle | Betaparticle Blog | 2.0 |
References
- http://blog.betaparticle.com/template_permalink.asp?id=68
- http://seclists.org/lists/bugtraq/2005/Mar/0360.html
- http://secunia.com/advisories/14668PatchVendor Advisory
- http://www.securityfocus.com/bid/12861Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19781
- http://blog.betaparticle.com/template_permalink.asp?id=68
- http://seclists.org/lists/bugtraq/2005/Mar/0360.html
- http://secunia.com/advisories/14668PatchVendor Advisory
- http://www.securityfocus.com/bid/12861Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19781
FAQ
What is CVE-2005-0854?
CVE-2005-0854 is a vulnerability with a CVSS score of 7.5 (HIGH). betaparticle blog (bp blog), posisbly before version 4, allows remote attackers to bypass authentication and (1) upload files via a direct request to upload.asp or (2) delete files via a direct reques...
How severe is CVE-2005-0854?
CVE-2005-0854 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0854?
Check the references section above for vendor advisories and patch information. Affected products include: Betaparticle Betaparticle Blog.