Vulnerability Description
Multiple PHP file include vulnerabilities in ezUpload 2.2 allow remote attackers to execute arbitrary code via the path parameter to (1) initialize.php, (2) customize.php, (3) form.php, or (4) index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ezupload | Ezupload | 2.2 |
References
- http://packetstorm.linuxsecurity.com/0508-exploits/ezuploadRemote.txtExploit
- http://secunia.com/advisories/16434Vendor Advisory
- http://securitytracker.com/id?1014723
- http://www.securiteam.com/exploits/5JP0J15GKU.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/14534Exploit
- http://www.vupen.com/english/advisories/2005/1379
- http://packetstorm.linuxsecurity.com/0508-exploits/ezuploadRemote.txtExploit
- http://secunia.com/advisories/16434Vendor Advisory
- http://securitytracker.com/id?1014723
- http://www.securiteam.com/exploits/5JP0J15GKU.htmlExploitVendor Advisory
- http://www.securityfocus.com/bid/14534Exploit
- http://www.vupen.com/english/advisories/2005/1379
FAQ
What is CVE-2005-2616?
CVE-2005-2616 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple PHP file include vulnerabilities in ezUpload 2.2 allow remote attackers to execute arbitrary code via the path parameter to (1) initialize.php, (2) customize.php, (3) form.php, or (4) index.p...
How severe is CVE-2005-2616?
CVE-2005-2616 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2616?
Check the references section above for vendor advisories and patch information. Affected products include: Ezupload Ezupload.