Vulnerability Description
Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lucidcrew | Pixie | 1.04 |
Related Weaknesses (CWE)
References
- http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.htmlExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/41784/
- http://rungga.blogspot.co.id/2017/04/remote-file-upload-vulnerability-in.htmlExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/41784/
FAQ
What is CVE-2017-7402?
CVE-2017-7402 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, s...
How severe is CVE-2017-7402?
CVE-2017-7402 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7402?
Check the references section above for vendor advisories and patch information. Affected products include: Lucidcrew Pixie.