First published: Sun Mar 13 2005(Updated: )
The custom avatar uploading feature (uploader.php) for XOOPS 2.0.9.2 and earlier allows remote attackers to upload arbitrary PHP scripts, whose file extensions are not filtered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
E-xoops | =1.0_rc1 | |
E-xoops | =1.0_rc3 | |
E-xoops | =1.0_rc3.0.5 | |
E-xoops | =1.3.5 | |
E-xoops | =1.3.6 | |
E-xoops | =1.3.7 | |
E-xoops | =1.3.8 | |
E-xoops | =1.3.9 | |
E-xoops | =1.3.10 | |
E-xoops | =2.0 | |
E-xoops | =2.0.1 | |
E-xoops | =2.0.2 | |
E-xoops | =2.0.3 | |
E-xoops | =2.0.5 | |
E-xoops | =2.0.5.1 | |
E-xoops | =2.0.5.2 | |
E-xoops | =2.0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0743 is considered a critical vulnerability due to its ability to allow remote code execution through file uploads.
To fix CVE-2005-0743, upgrade to XOOPS version 2.0.10 or later which addresses the vulnerability.
CVE-2005-0743 affects XOOPS versions 2.0.9.2 and earlier, as well as several 1.x versions.
CVE-2005-0743 enables remote attackers to upload arbitrary PHP scripts, leading to potential server compromise.
If unable to upgrade, consider disabling the avatar upload feature or implementing stricter file type validation.