Vulnerability Details : CVE-2012-4472
Potential exploit
Unrestricted file upload vulnerability in upload.php in the Drag & Drop Gallery module 6.x-1.5 and earlier for Drupal allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension followed by a safe extension, then accessing it via a direct request to the directory specified by the filedir parameter.
Products affected by CVE-2012-4472
- cpe:2.3:a:david_alkire:drag_\&_drop_gallery:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4472
0.69%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4472
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2012-4472
-
http://secunia.com/advisories/49698
Sign inVendor Advisory
-
http://www.securityfocus.com/bid/54380
Drupal Drag & Drop Gallery Module Arbitrary PHP Code Execution Vulnerability
-
http://www.opensyscom.fr/Actualites/drupal-modules-drag-a-drop-gallery-arbitrary-file-upload-vulnerability.html
404 Not FoundExploit
-
http://drupal.org/node/1679442
Access to this page has been denied.Patch;Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/10/04/5
oss-security - Re: CVE Request for Drupal Contributed Modules
Jump to