First published: Tue Dec 22 2009(Updated: )
Unrestricted file upload vulnerability in ofc_upload_image.php in Open Flash Chart v2 Beta 1 through v2 Lug Wyrm Charmer, as used in Piwik 0.2.35 through 0.4.3, Woopra Analytics Plugin before 1.4.3.2, and possibly other products, when register_globals is enabled, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension through the name parameter with the code in the HTTP_RAW_POST_DATA parameter, then accessing it via a direct request to the file in tmp-upload-images/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open Flash Chart | =2.0-beta_1 | |
Open Flash Chart | =2.0-gamera | |
Open Flash Chart | =2.0-hyperion | |
Open Flash Chart | =2.0-ichor | |
Open Flash Chart | =2.0-j_rmungandr | |
Open Flash Chart | =2.0-j_rmungandr-2 | |
Open Flash Chart | =2.0-kvasir | |
Open Flash Chart | =2.0-lug_wyrm_charmer | |
MediaWiki Matomo | =0.2.37 | |
MediaWiki Matomo | =0.4.2 | |
MediaWiki Matomo | =0.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4140 is considered a high severity vulnerability due to its potential for remote file upload leading to arbitrary code execution.
To fix CVE-2009-4140, disable register_globals in your PHP configuration and ensure proper validation of uploaded files.
CVE-2009-4140 affects Open Flash Chart versions 2.0-beta_1 through 2.0-lug_wyrm_charmer and specific versions of Piwik and Woopra Analytics Plugin.
CVE-2009-4140 is an unrestricted file upload vulnerability that allows authenticated remote users to upload malicious files.
The CVE-2009-4140 vulnerability was identified in the Open Flash Chart software created by Teethgrinder.co.uk.