cvelist/2007/2xxx/CVE-2007-2025.json
2019-03-18 00:06:25 +00:00

87 lines
2.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-2025",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://sourceforge.net/forum/message.php?msg_id=4249177",
"refsource": "MISC",
"url": "https://sourceforge.net/forum/message.php?msg_id=4249177"
},
{
"name": "DSA-1371",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1371"
},
{
"name": "[phpwiki-talk] 20070408 Important UpLoad security fix! was [Fwd: [phpwiki - Open Discussion] RE: upload security risk]",
"refsource": "MLIST",
"url": "http://www.nabble.com/Important-UpLoad-security-fix%21-was--Fwd%3A--phpwiki---Open-Discussion--RE%3A-upload-security-risk--t3543463.html"
},
{
"name": "26784",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26784"
},
{
"name": "GLSA-200705-16",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200705-16.xml"
},
{
"name": "25307",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25307"
}
]
}
}