Vulnerability Description
upload_handler.php in the swfupload extension in Chyrp 2.0 and earlier relies on client-side JavaScript code to restrict the file extensions of uploaded files, which allows remote authenticated users to upload a .php file, and consequently execute arbitrary PHP code, via a write_post action to the default URI under admin/.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chyrp | Chyrp | <= 2.0 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/8314
- http://www.justanotherhacker.com/advisories/JAHx113.txtExploit
- http://www.openwall.com/lists/oss-security/2011/07/13/5
- http://www.openwall.com/lists/oss-security/2011/07/13/6Exploit
- http://www.securityfocus.com/bid/48672Exploit
- http://securityreason.com/securityalert/8314
- http://www.justanotherhacker.com/advisories/JAHx113.txtExploit
- http://www.openwall.com/lists/oss-security/2011/07/13/5
- http://www.openwall.com/lists/oss-security/2011/07/13/6Exploit
- http://www.securityfocus.com/bid/48672Exploit
FAQ
What is CVE-2011-2745?
CVE-2011-2745 is a vulnerability with a CVSS score of 6.5 (MEDIUM). upload_handler.php in the swfupload extension in Chyrp 2.0 and earlier relies on client-side JavaScript code to restrict the file extensions of uploaded files, which allows remote authenticated users ...
How severe is CVE-2011-2745?
CVE-2011-2745 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2745?
Check the references section above for vendor advisories and patch information. Affected products include: Chyrp Chyrp.