Vulnerability Description
An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3) with HTTP requests. The application’s upload mechanism fails to restrict file types and does not validate or sanitize user-supplied input, allowing attackers to upload malicious .php scripts. Authentication can be bypassed entirely by supplying a specially crafted cookie (access=3), granting access to the upload functionality without valid credentials. If file uploads are enabled on the server, the attacker can upload a web shell and gain remote code execution with the privileges of the web server user, potentially leading to full system compromise.
Related Weaknesses (CWE)
References
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://sourceforge.net/projects/simplee-doc/
- https://www.exploit-db.com/exploits/31264
- https://www.vulncheck.com/advisories/simple-edocument-abitrary-file-upload-rce
FAQ
What is CVE-2014-125126?
CVE-2014-125126 is a documented vulnerability. An unrestricted file upload vulnerability exists in Simple E-Document versions 3.0 to 3.1 that allows an unauthenticated attacker to bypass authentication by sending a specific cookie header (access=3...
How severe is CVE-2014-125126?
CVSS scoring is not yet available for CVE-2014-125126. Check NVD for updates.
Is there a patch for CVE-2014-125126?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.