lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060726071538.25846.qmail@securityfocus.com> Date: 26 Jul 2006 07:15:38 -0000 From: hack2prison@...oo.com To: bugtraq@...urityfocus.com Subject: EzUpload multi file vulnerabilities I don't know anyone report this but I have detected this when test EzUpload Pro 2.2.0 Attacker can re-config EzUpload system without login. File: filter.php --> change Extensions Mode file type. File: access.php --> change Protection Method accept anyone upload file File: edituser.php --> Add user who can upload File: settings.php --> Change admin informations File: index.php --> Upload file without login even system require login Check it and fun