SECUNIA ADVISORY ID: SA32439
VERIFY ADVISORY: http://secunia.com/advisories/32439/
CRITICAL: Moderately critical
IMPACT: System access
SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/
DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.
The vulnerability is caused due to the "admin/FCKeditor/editor/filemanager/browser/default/connectors/phplist/connector.php" script improperly validating the extensions of uploaded files. This can potentially be exploited to upload files containing malicious file extensions and e.g. execute arbitrary PHP code. Successful exploitation requires valid administrator credentials.
SOLUTION: Update to version 2.10.7.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://sourceforge.net/project/shownotes.php?release_id=636287
phplist *connector.php* File Extension Validation VulnerabilityPosted on Tuesday, October 28, 2008 @ 19:27:38 CDT in Security |