Total vulnerabilities in the database
PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.
Software | From | Fixed in |
---|---|---|
php_fusion / php_fusion | 6.00.105 | 6.00.105.x |
php_fusion / php_fusion | 6.00.106 | 6.00.106.x |
php_fusion / php_fusion | 6.00.107 | 6.00.107.x |
php_fusion / php_fusion | 6.00.303 | 6.00.303.x |
php_fusion / php_fusion | 6.00.3 | 6.00.3.x |
php_fusion / php_fusion | 6.00.306 | 6.00.306.x |
php_fusion / php_fusion | 6.00.304 | 6.00.304.x |
php_fusion / php_fusion | 6.00.110 | 6.00.110.x |
php_fusion / php_fusion | 6.00.109 | 6.00.109.x |
php_fusion / php_fusion | 6.00.206 | 6.00.206.x |
php_fusion / php_fusion | 6.00.204 | 6.00.204.x |