Description
Unrestricted file upload vulnerability in Leap CMS 0.1.4 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via an admin.system.files (aka Manage Files) request to the default URI, then accessing the file via a direct request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2009-1610 | Unrestricted file upload vulnerability in Leap CMS 0.1.4 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via an admin.system.files (aka Manage Files) request to the default URI, then accessing the file via a direct request. |
References
| Link | Providers |
|---|---|
| https://www.exploit-db.com/exploits/8577 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T05:20:34.854Z
Reserved: 2009-05-11T00:00:00.000Z
Link: CVE-2009-1615
No data.
Status : Modified
Published: 2009-05-11T20:30:00.327
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-1615
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD