Unrestricted file upload vulnerability in the DownloadsPlus module in PHP-Nuke allows remote attackers to execute arbitrary code by uploading a file with (1) .htm, (2) .html, or (3) .txt extensions, then accessing it via a direct request to the file.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.  NOTE: it is unclear how allowing the upload of .html or .txt files supports arbitrary code execution; this might be legitimate functionality.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 00:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.juniper.net/security/auto/vulnerabilities/vuln28919.html - | |
| References | () http://www.securityfocus.com/bid/28919 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42007 - | 
Information
                Published : 2008-10-28 10:30
Updated : 2025-04-09 00:30
NVD link : CVE-2008-4767
Mitre link : CVE-2008-4767
CVE.ORG link : CVE-2008-4767
JSON object : View
Products Affected
                php-nuke
- downloadsplus_module
 
phpnuke
- php-nuke
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
