Vulnerability Details : CVE-2004-1545
UploadFile.php in MoniWiki 1.0.9.2 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.hwp, which allows remote attackers to upload and execute arbitrary code.
Vulnerability category: Execute code
Products affected by CVE-2004-1545
- cpe:2.3:a:moniwiki:moniwiki:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:moniwiki:moniwiki:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:moniwiki:moniwiki:1.0.9.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1545
4.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1545
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2004-1545
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/18493
-
http://www.securityfocus.com/bid/11951
Patch
-
http://archives.neohapsis.com/archives/fulldisclosure/2004-12/0448.html
Patch;Vendor Advisory
-
http://kldp.net/scm/cvsweb.php/moniwiki/plugin/UploadFile.php.diff?cvsroot=moniwiki&only_with_tag=HEAD&r1=text&tr1=1.17&r2=text&tr2=1.16&f=h
-
http://marc.info/?l=bugtraq&m=110314544711884&w=2
Jump to