Secunia Security Advisory - Liz0ziM has reported a vulnerability in Eduha Meeting, which can be exploited by malicious people to compromise a vulnerable system.
32ab732613bbc0fccd4bbc6bf3c9f1c2d3937be46f55ce63eb087294ca93893f
----------------------------------------------------------------------
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
----------------------------------------------------------------------
TITLE:
Eduha Meeting PHP File Upload Vulnerability
SECUNIA ADVISORY ID:
SA20731
VERIFY ADVISORY:
http://secunia.com/advisories/20731/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Eduha Meeting
http://secunia.com/product/10533/
DESCRIPTION:
Liz0ziM has reported a vulnerability in Eduha Meeting, which can be
exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to the script not correctly
restricting the extension of files that can be uploaded. This can be
exploited to upload and execute PHP files.
SOLUTION:
The latest version available from the vendor's website is not
affected by the vulnerability.
PROVIDED AND/OR DISCOVERED BY:
Liz0ziM
ORIGINAL ADVISORY:
http://www.biyosecurity.be/bugs/meeting.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------