8.2 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.042 Low
EPSS
Percentile
92.1%
UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
CPE | Name | Operator | Version |
---|---|---|---|
moniwiki:moniwiki | moniwiki | eq | 1.0.9.1 |
moniwiki:moniwiki | moniwiki | eq | 1.0.8 |
moniwiki:moniwiki | moniwiki | eq | 1.0.9 |
archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html
kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h
marc.info/?l=bugtraq&m=110314544711884&w=2
secunia.com/advisories/13478
www.securityfocus.com/bid/11951
exchange.xforce.ibmcloud.com/vulnerabilities/18493