Vulnerability Description
The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Efiction Project | Efiction | 1.1 |
References
- http://archives.neohapsis.com/archives/bugtraq/2005-11/0301.htmlExploitVendor Advisory
- http://rgod.altervista.org/efiction2_xpl.htmlExploitVendor Advisory
- http://secunia.com/advisories/17777ExploitVendor Advisory
- http://securitytracker.com/id?1015273Exploit
- http://www.efiction.wallflowergirl.com/forums/viewtopic.php?t=1555
- http://www.osvdb.org/21124
- http://www.securityfocus.com/bid/15568Exploit
- http://archives.neohapsis.com/archives/bugtraq/2005-11/0301.htmlExploitVendor Advisory
- http://rgod.altervista.org/efiction2_xpl.htmlExploitVendor Advisory
- http://secunia.com/advisories/17777ExploitVendor Advisory
- http://securitytracker.com/id?1015273Exploit
- http://www.efiction.wallflowergirl.com/forums/viewtopic.php?t=1555
- http://www.osvdb.org/21124
- http://www.securityfocus.com/bid/15568Exploit
FAQ
What is CVE-2005-4171?
CVE-2005-4171 is a vulnerability with a CVSS score of 7.5 (HIGH). The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php...
How severe is CVE-2005-4171?
CVE-2005-4171 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4171?
Check the references section above for vendor advisories and patch information. Affected products include: Efiction Project Efiction.