NONE · 0

CVE-2013-10067

Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows user...

Vulnerability Description

Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows users with administrator privileges to upload files to the gw_temp/a/ directory. Due to insufficient validation of file type and path, attackers can upload and execute PHP payloads, resulting in remote code execution.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-10067?

CVE-2013-10067 is a documented vulnerability. Glossword versions 1.8.8 through 1.8.12 contain an authenticated arbitrary file upload vulnerability. When deployed as a standalone application, the administrative interface (gw_admin.php) allows user...

How severe is CVE-2013-10067?

CVSS scoring is not yet available for CVE-2013-10067. Check NVD for updates.

Is there a patch for CVE-2013-10067?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.