---------------------------------------------------------------------- Proof-of-Concept (PoC) and Extended Analysis available for customers. Get a free trial, contact sales@secunia.com ---------------------------------------------------------------------- TITLE: iNetScripts Free Upload Script File Upload Vulnerability SECUNIA ADVISORY ID: SA39584 VERIFY ADVISORY: http://secunia.com/advisories/39584/ DESCRIPTION: A vulnerability has been reported in iNetScripts Free Upload Script, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the index2.php script improperly validating uploaded files. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script with multiple extensions. Successful exploitation of this vulnerability requires e.g. that Apache is not configured to handle the mime-type for files with an "pjpeg" extension. SOLUTION: Grant only trusted users access to the application. PROVIDED AND/OR DISCOVERED BY: Sec-q8 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------