Vulnerability Description
Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ezonescripts | Living Local | 1.1 |
References
- http://www.securityfocus.com/bid/32760Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47215
- https://www.exploit-db.com/exploits/7408
- http://www.securityfocus.com/bid/32760Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47215
- https://www.exploit-db.com/exploits/7408
FAQ
What is CVE-2008-6530?
CVE-2008-6530 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable...
How severe is CVE-2008-6530?
CVE-2008-6530 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6530?
Check the references section above for vendor advisories and patch information. Affected products include: Ezonescripts Living Local.