First published: Wed Jun 27 2007(Updated: )
Unrestricted file upload vulnerability in signup.php in e107 0.7.8 and earlier, when photograph upload is enabled, allows remote attackers to upload and execute arbitrary PHP code via a filename with a double extension such as .php.jpg.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
e107 CMS | =0.7.7 | |
e107 CMS | =0.7.4 | |
e107 CMS | =0.7.5 | |
e107 CMS | =0.7.2 | |
e107 CMS | =0.7 | |
e107 CMS | =0.7.1 | |
e107 CMS | =0.7.8 | |
e107 CMS | =0.7.6 | |
e107 CMS | =0.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3429 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-3429, upgrade to e107 version 0.7.9 or later, which addresses this file upload vulnerability.
CVE-2007-3429 affects e107 versions 0.7.0 up to and including 0.7.8.
Yes, CVE-2007-3429 can be exploited by attackers to upload and execute arbitrary PHP code through manipulated file uploads.
CVE-2007-3429 enables arbitrary code execution attacks through unrestricted file uploads.