Vulnerability Details : CVE-2009-0372
Unrestricted file upload vulnerability in index.php in Miltenovik Manojlo MemHT Portal 4.0.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and an image content type via a users editProfile action, then accessing this file via a direct request to the file in images/avatar/uploaded/.
Vulnerability category: Input validationExecute code
Exploit prediction scoring system (EPSS) score for CVE-2009-0372
Probability of exploitation activity in the next 30 days: 1.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0372
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
[email protected] |
CWE ids for CVE-2009-0372
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: [email protected] (Primary)
References for CVE-2009-0372
Products affected by CVE-2009-0372
- cpe:2.3:a:memht:memht_portal:*:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.3:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.2:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.5:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.0:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4.5:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4.5:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.0:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.9:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:1.5:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:1.5:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.5.0:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.1:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.1:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.0:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.5:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.4:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.3:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:2.9:update:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.0:full:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:1.0:final:*:*:*:*:*:*
- cpe:2.3:a:memht:memht_portal:3.9.0:*:*:*:*:*:*:*