header-logo
Suggest Exploit
vendor:
FOSS Gallery Public Version
by:
Pepelux
7.5
CVSS
HIGH
Arbitrary file upload
264
CWE
Product Name: FOSS Gallery Public Version
Affected Version From: <= 1.0
Affected Version To: <= 1.0
Patch Exists: YES
Related CWE: N/A
CPE: a:foss_gallery:foss_gallery_public_version
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

FOSS Gallery Public Version <= 1.0 / Arbitrary file upload Vulnerabilities

FOSS Gallery Public Version <= 1.0 is vulnerable to an arbitrary file upload vulnerability. This vulnerability allows an attacker to upload a malicious file to the web server, which can then be used to execute arbitrary code.

Mitigation:

Upgrade to the latest version of FOSS Gallery Public Version.
Source

Exploit-DB raw data:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FOSS Gallery Public Version <= 1.0 / Arbitrary file upload Vulnerabilities
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Program: FOSS Gallery Public Version
Version: <= 1.0
File affected: processFiles.php
Download: http://sourceforge.net/projects/fossgallery/


Found by Pepelux <pepelux[at]enye-sec.org>
eNYe-Sec - www.enye-sec.org

-- Bug --
Website doesn't check the images format and you can upload PHP files.

-- Exploit --
http://localhost/shell.php

# milw0rm.com [2008-10-05]