← Zuruck zu CVEs
CVE-2015-1604
N/ABeschreibung
Unrestricted file upload vulnerability in asys/site/files.php in Adminsystems CMS before 4.0.2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in upload/files/.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht2/19/2015
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
adminsystems_cms_project:adminsystems_cms
Schwachen (CWE)
CWE-20
Referenzen
http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html(cve@mitre.org)
http://seclists.org/fulldisclosure/2015/Feb/50(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/13/11(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/14/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/14/5(cve@mitre.org)
http://www.securityfocus.com/bid/72605(cve@mitre.org)
https://github.com/kneecht/adminsystems/issues/1(cve@mitre.org)
https://github.com/kneecht/adminsystems/releases/tag/4.0.2(cve@mitre.org)
http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2015/Feb/50(af854a3a-2127-422b-91ae-364da2661108)
http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/13/11(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/14/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/14/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/72605(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/kneecht/adminsystems/issues/1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/kneecht/adminsystems/releases/tag/4.0.2(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.