Vulnerability Details : CVE-2013-6227
Unrestricted file upload vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to execute arbitrary code by uploading an executable file, and then accessing this file at a location specified by the format parameter of a move operation.
Vulnerability category: Execute code
Products affected by CVE-2013-6227
- cpe:2.3:a:ajaxplorer:ajaxplorer:*:*:*:*:*:*:*:*
- cpe:2.3:a:pydio:pydio:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6227
9.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6227
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2013-6227
-
http://www.redfsec.com/CVE-2013-6227
URL Repurposed
-
https://www.exploit-db.com/exploits/46206/
Pydio / AjaXplorer < 5.0.4 - (Unauthenticated) Arbitrary File Upload - PHP webapps Exploit
-
http://pyd.io/pydio-core-5-0-4/
ERROR #404 EN | PydioPatch;Vendor Advisory
Jump to