Arbitrary file upload in Atomymaxsite - CVE-2012-6498
Published: January 11, 2017 / Updated: March 13, 2017
Vulnerability identifier: #VU4202
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/U:Red
CVE-ID: CVE-2012-6498
CWE-ID: CWE-434
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Atomymaxsite
Affected software:
Atomymaxsite
Atomymaxsite
Detailed vulnerability description
The vulnerability allows a remote attacker to cause arbitrary code execution on the original server.
The weakness exists due to improper validation of file extensions in "index.php" script when uploading files. A remote attacker can upload arbitrary file with .php extension and execute it on the system with privileges of the web server.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability was being actively exploited.
The weakness exists due to improper validation of file extensions in "index.php" script when uploading files. A remote attacker can upload arbitrary file with .php extension and execute it on the system with privileges of the web server.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note: the vulnerability was being actively exploited.
How to mitigate CVE-2012-6498
Install update from vendor's website.