0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
HelpDEZk 1.0.1 Unrestricted File Upload Vulnerability
Author
Risk
[
Security Risk High
]0day-ID
Category
Date add
CVE
Platform
Product: HelpDEZk Vendor: HelpDEZk Vulnerable Version(s): 1.0.1 and probably prior Tested Version: 1.0.1 Advisory Publication: October 15, 2014 [without technical details] Vendor Notification: October 15, 2014 Public Disclosure: November 5, 2014 Vulnerability Type: Unrestricted Upload of File with Dangerous Type [CWE-434] CVE Reference: CVE-2014-8337 Risk Level: Critical CVSSv2 Base Score: 10 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Solution Status: Solution Available Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ ) ----------------------------------------------------------------------------------------------- Advisory Details: High-Tech Bridge Security Research Lab discovered vulnerability in HelpDEZk, which can be exploited to compromise vulnerable web site. 1) Unrestricted Upload of File with Dangerous Type in HelpDEZk: CVE-2014-8337 The vulnerability exists due to absence of validation of file extensions when uploading files in "/includes/classes/uploadify-v2.1.4/uploadify.php" script. A remote attacker can upload files with arbitrary extension into directory within application's web root and execute them with privileges of the web server. Additionally, access to the upload script is not restricted to anonymous users. A remote unauthenticated attacker can access the vulnerable script and successfully upload malicious files on the server. Below we provide an example of form that can be used to upload files on the vulnerable website: <form action="http://[host]/includes/classes/uploadify-v2.1.4/uploadify.php?folder=" method="post" name="main" enctype="multipart/form-data"> <input type="file" name="Filedata"> <input type="submit" id="btn"> </form> ----------------------------------------------------------------------------------------------- Solution: Remove "uploadify" files from "/includes/classes/" directory. # 0day.today [2024-12-24] #