lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201805232104.w4NL4wrl022068@ip-100-122-153-233.us-east-1.ec2.aws.symcpe.net>
Date: Wed, 23 May 2018 21:04:58 GMT
From: reggie.dodd30@...il.com
To: bugtraq@...urityfocus.com
Subject: PHP Login & User Management <= 4.1.0 - Arbitrary File Upload
 (CVE-2018-11392)

[Title]
PHP Login & User Management <= 4.1.0 - Arbitrary File Upload (CVE-2018-11392)

[Product]
PHP Login & User Management
https://codecanyon.net/item/php-login-user-management/49008

[CVE]
CVE-2018-11392

[Credit]
Reginald Dodd

[Description]
An arbitrary file upload vulnerability in /classes/profile.class.php in Jigowatt "PHP Login & User Management" before 4.1.1, as distributed in the Envato Market, allows any remote authenticated user to upload .php files to the web server via a profile avatar field. This results in arbitrary code execution by requesting the .php file.

[Affected Versions] 
v4.1.0 and below

[Solution]
Upgrade to v4.1.1

[Timeline]
April 28, 2018 - A detailed vulnerability report was sent to the vendor.
May 1, 2018 - The vendor acknowledged the report.
May 15, 2018 - The developer made the fix available through the vendor's marketplace.
May 22, 2018 - I requested an update, and the vendor stated that this issue has been "resolved".
May 22, 2018 - Mitre assigned a CVE.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ