{ "id": "CVE-2007-5156", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-01T05:17:00.000", "lastModified": "2020-10-14T13:19:27.667", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in editor/filemanager/upload/php/upload.php in FCKeditor, as used in SiteX CMS 0.7.3.beta, La-Nai CMS, Syntax CMS, Cardinal Cms, and probably other products, allows remote attackers to upload and execute arbitrary PHP code via a file whose name contains \".php.\" and has an unknown extension, which is recognized as a .php file by the Apache HTTP server, a different vulnerability than CVE-2006-0658 and CVE-2006-2529." }, { "lang": "es", "value": "Una vulnerabilidad de lista negra incompleta en el archivo editor/filemanager/upload/php/upload.php en FCKeditor, tal y como es usado en SiteX CMS versiones 0.7.3.beta, La-Nai CMS, Syntax CMS, Cardinal Cms, y probablemente otros productos, permite a atacantes remotos cargar y ejecutar c\u00f3digo PHP arbitrario por medio de un archivo cuyo nombre contiene \".php.\" y que presenta una extensi\u00f3n desconocida, la cual es reconocida como un archivo .php por el servidor HTTP de Apache, una vulnerabilidad diferente de CVE-2006-0658 y CVE-2006-2529." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cardinal_cms_project:cardinal_cms:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6C9ECB0B-59AF-4366-96AB-F58ED444E4BE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redlinesoft:lanai_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.2.16", "matchCriteriaId": "EF3214CD-E007-40CF-821D-EDD2BAA13C90" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sitex_cms_project:sitex_cms:0.7.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6225A425-A386-490F-9E51-6F8A2DCFAB9E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:syntax_cms_project:syntax_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.3", "matchCriteriaId": "5D3AA53A-BA25-4395-86C2-9ED679BD4292" } ] } ] } ], "references": [ { "url": "http://dev.fckeditor.net/changeset/973", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://dev.fckeditor.net/ticket/1325", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/3182", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/archive/1/480830/100/0/threaded", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/29422", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/30677", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.waraxe.us/advisory-57.html", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42425", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42733", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44455", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/5618", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.exploit-db.com/exploits/5688", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ] } ] }