CVE-2014-0342
Published Apr 15, 2014
Last updated 11 years ago
Overview
- Description
- Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX before 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.
- Source
- cret@cert.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Evaluator
- Comment
- Per: http://cwe.mitre.org/data/definitions/434.html "CWE-434: Unrestricted Upload of File with Dangerous Type"
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pivotx:pivotx:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E358420F-288B-4AD9-9FEC-1B5E6BCC9581", "versionEndIncluding": "2.3.8" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3990C45-2F1A-4E97-80CD-1BF07A6DEE84" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "847926C5-EC16-420B-993F-D0C6991DD0AD" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "101512B3-9573-45F0-8E23-ECCFBC7BC981" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEB36519-001A-446F-B680-2DCBF4A7C4F8" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:b1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D09514E0-221A-4A8C-BE34-CCCEDFBE54C4" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:b2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A43A812E-D866-45AB-92DF-A5617279FC10" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.0:rc:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "179DBEB0-22A0-46EA-9E48-BC3A79C1E37A" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF74C6E-E55E-4C01-B4C9-6BB60D57E889" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47F90583-61D3-42C2-9819-4AC507B1CC95" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7925A020-5937-4C46-BAA9-06346E3F0A95" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F054EB0-C027-427C-B95E-A8C1B657D45F" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C195C336-C3AE-44FC-B711-201173E13A91" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E5412F2-CF80-4082-A9D3-985CE8A1AB2F" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21685794-283D-4C6E-BC59-AA4769BEE5AB" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E97ECB-93F4-41C9-84F5-E59F9A5B249C" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA2BA04E-2C8B-46C8-AB95-BB62F1DC2404" }, { "criteria": "cpe:2.3:a:pivotx:pivotx:2.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9A720BF-6AD1-479C-9264-012577F22EB6" } ], "operator": "OR" } ] } ]