Unrestricted file upload vulnerability in PHProjekt 5.2.0, when magic_quotes_gpc is disabled, allows remote authenticated users to upload and execute arbitrary PHP code via a file with an executable extension, which is then accessed by the (1) calendar or (2) file management module, or possibly unspecified other files.
References
Configurations
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/35163 - | |
References | () http://secunia.com/advisories/24509 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/25748 - | |
References | () http://security.gentoo.org/glsa/glsa-200706-07.xml - | |
References | () http://securityreason.com/securityalert/2476 - | |
References | () http://www.nruns.de/security_advisory_phprojekt_privilege_escalation.php - | |
References | () http://www.phprojekt.com/index.php?name=News&file=article&sid=276 - | |
References | () http://www.securityfocus.com/archive/1/462785/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/22956 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32995 - |
Information
Published : 2007-03-23 23:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-1639
Mitre link : CVE-2007-1639
CVE.ORG link : CVE-2007-1639
JSON object : View
Products Affected
phpprojekt
- phpprojekt
CWE