Vulnerability Description
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
Related Weaknesses (CWE)
References
- http://web.archive.org/web/20170128123244/http://www.opensyscom.fr/Actualites/eg
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://sourceforge.net/projects/e-gallery/
- https://www.exploit-db.com/exploits/20029
- https://www.vulncheck.com/advisories/egallery-arbitrary-php-file-upload
- http://web.archive.org/web/20170128123244/http://www.opensyscom.fr/Actualites/eg
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://www.exploit-db.com/exploits/20029
FAQ
What is CVE-2012-10052?
CVE-2012-10052 is a documented vulnerability. EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remot...
How severe is CVE-2012-10052?
CVSS scoring is not yet available for CVE-2012-10052. Check NVD for updates.
Is there a patch for CVE-2012-10052?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.