[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100423042125.14971.qmail@securityfocus.com>
Date: 23 Apr 2010 04:21:25 -0000
From: eidelweiss@...erservices.com
To: bugtraq@...urityfocus.com
Subject: In-portal 5.0.3 Remote Arbitrary File Upload Exploit
In-portal is prone to a remote arbitrary file-upload vulnerability
This issue may allow remote attackers to upload arbitrary files, including malicious scripts, and possibly to execute a script on the affected server.
In-portal Web 2.0 CMS v5.0.3 is affected by this issue. Other or lowers versions may be vulnerable as well.
Reports indicate that this issue is being exploited in the wild.
The following exploit code is available:
http://inj3ct0r.com/exploits/11949
Powered by blists - more mailing lists