Arbitrary PHP Code Execution via Image Upload in eFiction 1.1

Arbitrary PHP Code Execution via Image Upload in eFiction 1.1

CVE-2005-4171 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

The "Upload new image" command in the "Manage Images" eFiction 1.1, when members are allowed to upload images, allows remote attackers to execute arbitrary PHP code by uploading a filename with a .php extension that contains a GIF header, which passes the image validity check but executes any PHP code within the file.

Learn more about our Web Application Penetration Testing UK.