Resource management error in PivotX - CVE-2017-7570
Published: June 1, 2017
Vulnerability identifier: #VU6851
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/U:Green
CVE-ID: CVE-2017-7570
CWE-ID: CWE-399
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: pivotlog.net
Affected software:
PivotX
PivotX
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.
The vulnerability exists due to insufficient error handling when processing file uploads for files with identical names. A remote authenticated attacker can upload a file with same extension (e.g. ".jpg") and then invoke a duplicate function to change the file extension to .php.
Successful exploitation may allow an attacker to compromise vulnerable website.
The vulnerability exists due to insufficient error handling when processing file uploads for files with identical names. A remote authenticated attacker can upload a file with same extension (e.g. ".jpg") and then invoke a duplicate function to change the file extension to .php.
Successful exploitation may allow an attacker to compromise vulnerable website.
How to mitigate CVE-2017-7570
Install update from vendor's repository.