Vulnerability Details : CVE-2007-5231
Unrestricted file upload vulnerability in admin/upload_files.php in Zomplog 3.8.1 and earlier allows remote authenticated administrators to upload and execute arbitrary .php files by sending a modified MIME type. NOTE: this can be exploited by unauthenticated attackers by leveraging CVE-2007-5230.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2007-5231
Probability of exploitation activity in the next 30 days: 0.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-5231
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:N/AC:H/Au:S/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2007-5231
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-5231
Products affected by CVE-2007-5231
- cpe:2.3:a:zomplog:zomplog:3.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:zomplog:zomplog:3.8:*:*:*:*:*:*:*
- cpe:2.3:a:zomplog:zomplog:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:zomplog:zomplog:3.7:*:*:*:*:*:*:*