CVE-2011-1329
Published May 31, 2011
Last updated 7 years ago
Overview
- Description
- WalRack 1.x before 1.1.9 and 2.x before 2.0.7 does not properly restrict file uploads, which allows remote attackers to execute arbitrary PHP code via vectors involving a double extension, as demonstrated by a .php.zzz file.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9A52937-81FC-4579-91EB-4A071D0E2579" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5394CB7C-FA89-43BC-A275-FE42E16A7004" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB8A2BF6-E4AF-45A5-A2EB-B43FAA1E0721" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "075F6130-3292-4976-A50D-9502EDD59883" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD991FC4-98AD-4973-9553-392D525EA283" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79CE2E8F-6203-4797-9B99-25791B74A2DF" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D3F3614-0D39-4788-A93B-768A7FA44E89" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB613E0A-D440-4C03-A5FE-05992E2CCA8C" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:1.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "470D5A32-7C69-46DE-8EDC-FA3F846414CE" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8C7C0AB-E7AA-4087-89B8-6578CCF10D82" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EA0917-D51D-4FBA-91C2-747AB2C08CFA" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8425A0C-D4A2-4B34-AD8D-D1B65D1E8B68" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "365915AF-77D9-4066-A0A9-F0F9EDD14136" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14F58E3B-B906-4D07-9490-A54037A93FB2" }, { "criteria": "cpe:2.3:a:walrus_digit:walrack:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D782EBEE-A058-4E78-B632-466E7B6DE444" } ], "operator": "OR" } ] } ]