Magix CMS 'upload. php' Arbitrary File upload Vulnerability
Release date:
Updated on:
Affected Systems:
Magix CMS 2.3.5
Description:
--------------------------------------------------------------------------------
Bugtraq id: 54254
Magix CMS is an open-source content management system.
Magix CMS 2.3.5 has a security vulnerability when filtering user input. Attackers can exploit this vulnerability to upload arbitrary code and execute it in network server processes, which can lead to illegal access or privilege escalation.
Framework/js/ckeditor/plugins/pdw_file_browser/swfupload/upload. the php script does not correctly verify the extension of the uploaded file. PHP files with the JPG file extension can lead to PHP code by the operator.
<* Source: Sammy Forgit
Link: http://secunia.com/advisories/49797/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Magix CMS
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.magix-cms.com/