First published: Mon May 18 2009(Updated: )
Unrestricted file upload vulnerability in admin/uploadimage.php in eLitius 1.0 allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files via an avatar file with an accepted Content-Type such as image/gif, then requesting the file in admin/banners/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intelliants Elitius | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1659 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2009-1659, you should update to the latest version of eLitius and implement proper file upload validation.
An attacker can exploit CVE-2009-1659 to upload and execute arbitrary files on the server, potentially leading to a full system compromise.
CVE-2009-1659 affects eLitius version 1.0, allowing unauthorized file uploads.
A temporary workaround for CVE-2009-1659 involves restricting file types and validating uploads on the server side.