First published: Thu Feb 19 2009(Updated: )
Unrestricted file upload vulnerability in editor/filemanager/browser/default/connectors/php/connector.php in FCKeditor 2.2, as used in Falt4 CMS, Nuke ET, and other products, allows remote attackers to execute arbitrary code by creating a file with PHP sequences preceded by a ZIP header, uploading this file via a FileUpload action with the application/zip content type, and then accessing this file via a direct request to the file in UserFiles/File/, probably a related issue to CVE-2005-4094. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ht Editor | =2.0rc2 | |
Ht Editor | =2.0rc3 | |
Ht Editor | =2.2 | |
Ht Editor | =2.3beta | |
Ht Editor | =2.4.3 | |
Phplist Phplist | =2.10.1 | |
Phplist Phplist | =2.10.2 | |
Phplist Phplist | =2.10.3 | |
Phplist Phplist | =2.10.4 | |
Phplist Phplist | =2.10.5 | |
Phplist Phplist | =2.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6178 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2008-6178, you should upgrade to a patched version of FCKeditor or apply relevant security patches provided by the vendors.
CVE-2008-6178 is an unrestricted file upload vulnerability that allows attackers to upload malicious PHP files.
CVE-2008-6178 affects FCKeditor versions 2.0rc2, 2.0rc3, 2.2, as well as various versions of Phplist CMS.
Yes, CVE-2008-6178 can potentially lead to data theft as it allows remote attackers to execute arbitrary code on the server.