Vulnerability Description
Unrestricted file upload vulnerability in processFiles.php in FOSS Gallery Admin and FOSS Gallery Public 1.0 beta allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the root directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Foss Gallery | Foss Gallery | 1.0 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/4379
- http://www.securityfocus.com/bid/31574Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45683
- https://www.exploit-db.com/exploits/6670
- https://www.exploit-db.com/exploits/6674
- https://www.exploit-db.com/exploits/6680
- http://securityreason.com/securityalert/4379
- http://www.securityfocus.com/bid/31574Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45683
- https://www.exploit-db.com/exploits/6670
- https://www.exploit-db.com/exploits/6674
- https://www.exploit-db.com/exploits/6680
FAQ
What is CVE-2008-4509?
CVE-2008-4509 is a vulnerability with a CVSS score of 10.0 (HIGH). Unrestricted file upload vulnerability in processFiles.php in FOSS Gallery Admin and FOSS Gallery Public 1.0 beta allows remote attackers to execute arbitrary code by uploading a file with an executab...
How severe is CVE-2008-4509?
CVE-2008-4509 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-4509?
Check the references section above for vendor advisories and patch information. Affected products include: Foss Gallery Foss Gallery.