#VU4202 Arbitrary file upload in Atomymaxsite - CVE-2012-6498
Published: January 11, 2017 / Updated: March 13, 2017
Vulnerability identifier: #VU4202
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/U:Red
CVE-ID: CVE-2012-6498
CWE-ID: CWE-434
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Atomymaxsite
Atomymaxsite
Software vendor:
Atomymaxsite
Atomymaxsite
Description
The vulnerability allows a remote attacker to cause arbitrary code execution on the original server.
The weakness exists due to improper validation of file extensions in "index.php" script when uploading files. A remote attacker can upload arbitrary file with .php extension and execute it on the system with privileges of the web server.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability was being actively exploited.
The weakness exists due to improper validation of file extensions in "index.php" script when uploading files. A remote attacker can upload arbitrary file with .php extension and execute it on the system with privileges of the web server.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability was being actively exploited.
Remediation
Install update from vendor's website.