First published: Tue Nov 22 2005(Updated: )
Exponent CMS 0.96.3 and later versions does not properly restrict the types of uploaded files, which allows remote attackers to upload and execute PHP files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponent Exponent | =0.94 | |
Exponent Exponent | =0.96.3 | |
Exponent Exponent | =0.96.1 | |
Exponent Exponent | =0.95 | |
Exponent Exponent | =0.96.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3767 is considered a high severity vulnerability due to the risk of remote code execution.
To remediate CVE-2005-3767, ensure that file uploads are restricted to specific file types and that appropriate server-side validation checks are implemented.
CVE-2005-3767 affects Exponent CMS versions 0.94, 0.95, 0.96.1, 0.96.3, and 0.96.4.
Yes, CVE-2005-3767 can lead to data breaches as attackers can upload malicious PHP files that may compromise the server.
There is no specific patch for CVE-2005-3767; the mitigation involves implementing best practices for file upload validation.