by r0t,der4444,cembo,VietMafia

Monday, May 29, 2006

DGNews v 1.5 File Upload Vuln.

###############################################
Vuln. discovered by : r0t
Date: 29 may 2006
vendor:www.diangemilang.com/dgscripts.php
affected versions:v 1.5 and prior
###############################################


Vuln. Description:

Due to improper checks of file extensions in admin/upprocess.php it is possible to upload arbitrary files to the "img" directory. This can e.g. be exploited to upload and execute malicious PHP scripts.


note: Successful exploitation requires access to the administration section.

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew