Vulnerability Description
Unrestricted file upload vulnerability in cp_upload_image.php in LightBlog 9.5 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the blog's root directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lightblog | Lightblog | 9.5 |
Related Weaknesses (CWE)
References
- http://omni.netsons.org/blog/?p=11
- http://secunia.com/advisories/28734Vendor Advisory
- http://securityreason.com/securityalert/3617
- http://www.securityfocus.com/archive/1/487398/100/0/threaded
- http://www.securityfocus.com/bid/27562
- https://www.exploit-db.com/exploits/5033
- http://omni.netsons.org/blog/?p=11
- http://secunia.com/advisories/28734Vendor Advisory
- http://securityreason.com/securityalert/3617
- http://www.securityfocus.com/archive/1/487398/100/0/threaded
- http://www.securityfocus.com/bid/27562
- https://www.exploit-db.com/exploits/5033
FAQ
What is CVE-2008-0632?
CVE-2008-0632 is a vulnerability with a CVSS score of 9.3 (HIGH). Unrestricted file upload vulnerability in cp_upload_image.php in LightBlog 9.5 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via...
How severe is CVE-2008-0632?
CVE-2008-0632 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0632?
Check the references section above for vendor advisories and patch information. Affected products include: Lightblog Lightblog.