CVE-2008-6178
Published Feb 19, 2009
Last updated 7 years ago
Overview
- Description
- Unrestricted file upload vulnerability in editor/filemanager/browser/default/connectors/php/connector.php in FCKeditor 2.2, as used in Falt4 CMS, Nuke ET, and other products, allows remote attackers to execute arbitrary code by creating a file with PHP sequences preceded by a ZIP header, uploading this file via a FileUpload action with the application/zip content type, and then accessing this file via a direct request to the file in UserFiles/File/, probably a related issue to CVE-2005-4094. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fckeditor:fckeditor:2.0rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6F9F4D2-0A3E-49D6-9A58-D9BCDF492E90" }, { "criteria": "cpe:2.3:a:fckeditor:fckeditor:2.0rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF47BD2F-7AC9-490E-9289-9C259FE4F231" }, { "criteria": "cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2823302-CCF1-438B-B962-6EE49D371A28" }, { "criteria": "cpe:2.3:a:fckeditor:fckeditor:2.3beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F841DE0-94A3-45E5-9DF6-516BDBE13CAE" }, { "criteria": "cpe:2.3:a:fckeditor:fckeditor:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68C583B7-5A09-4849-A1E1-600C87854A24" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD0770F6-4C09-4D77-A25A-2D9C59B73795" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AB6728E-74D6-4939-AA0F-6560678201CA" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7212A91B-F75D-43CB-90E3-7420C0EA861A" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFECF781-0084-4FBD-BD88-E55C85D9480C" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5492C3F-8833-4F66-B98F-C2B33AD1F14B" }, { "criteria": "cpe:2.3:a:phplist:phplist:2.10.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB4693DD-6CAE-437E-9D36-C1182F495984" } ], "operator": "OR" } ] } ]