vendor:
Ajax File and Image Manager
by:
Egidio Romano aka EgiX
7.5
CVSS
HIGH
Remote Code Execution
CWE
Product Name: Ajax File and Image Manager
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2011
Ajax File and Image Manager v1.0 Final Remote Code Execution Vulnerability
The vulnerable code is located in /ajaxfilemanager/ajax_create_folder.php. The script starts output buffering at line 11 and then calls the 'displayArray' function to display the $_POST array content. At line 13, the 'writeInfo' function is called with the current buffer content as a parameter. The 'writeInfo' function writes the parameter data into a file called 'data.php' without any check, allowing an attacker to inject and execute arbitrary PHP code.
Mitigation:
Apply the vendor's fix in the next version.