Description
Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.
Published: 2009-03-26
Score: 6.5 Medium
EPSS: 3.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2008-6497 Unrestricted file upload vulnerability in editimage.php in eZoneScripts Living Local 1.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the uploaded file.
History

No history.

Subscriptions

Ezonescripts Living Local
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T11:34:47.023Z

Reserved: 2009-03-26T00:00:00.000Z

Link: CVE-2008-6530

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-03-26T21:00:00.297

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-6530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses