← Back to CVEs
CVE-2015-1604
N/ADescription
Unrestricted file upload vulnerability in asys/site/files.php in Adminsystems CMS before 4.0.2 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in upload/files/.
CVE Details
CVSS v3.1 ScoreN/A
Published2/19/2015
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
adminsystems_cms_project:adminsystems_cms
Weaknesses (CWE)
CWE-20
References
http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html(cve@mitre.org)
http://seclists.org/fulldisclosure/2015/Feb/50(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/13/11(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/14/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2015/02/14/5(cve@mitre.org)
http://www.securityfocus.com/bid/72605(cve@mitre.org)
https://github.com/kneecht/adminsystems/issues/1(cve@mitre.org)
https://github.com/kneecht/adminsystems/releases/tag/4.0.2(cve@mitre.org)
http://packetstormsecurity.com/files/130394/Landsknecht-Adminsystems-CMS-4.0.1-CSRF-XSS-File-Upload.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2015/Feb/50(af854a3a-2127-422b-91ae-364da2661108)
http://sroesemann.blogspot.de/2015/02/report-for-advisory-sroeadv-2015-14.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/13/11(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/14/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2015/02/14/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/72605(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/kneecht/adminsystems/issues/1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/kneecht/adminsystems/releases/tag/4.0.2(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.