Vulnerabilities > CVE-2005-2733 - Remote Arbitrary File Upload vulnerability in Alexander Palmo Simple PHP Blog 0.4.0
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Simple PHP Blog. CVE-2005-2733. Webapps exploit for php platform id EDB-ID:16883 last seen 2016-02-02 modified 2010-07-25 published 2010-07-25 reporter metasploit source https://www.exploit-db.com/download/16883/ title Simple PHP Blog <= 0.4.0 - Remote Command Execution description Simple PHP Blog <= 0.4.0 Multiple Remote Exploits. CVE-2005-2192,CVE-2005-2733,CVE-2005-2787. Webapps exploit for php platform id EDB-ID:1191 last seen 2016-01-31 modified 2005-09-01 published 2005-09-01 reporter Kenneth Belva source https://www.exploit-db.com/download/1191/ title Simple PHP Blog <= 0.4.0 - Multiple Remote Exploits
Metasploit
description | This module combines three separate issues within The Simple PHP Blog (<= 0.4.0) application to upload arbitrary data and thus execute a shell. The first vulnerability exposes the hash file (password.txt) to unauthenticated users. The second vulnerability lies within the image upload system provided to logged-in users; there is no image validation function in the blogger to prevent an authenticated user from uploading any file type. The third vulnerability occurs within the blog comment functionality, allowing arbitrary files to be deleted. |
id | MSF:EXPLOIT/UNIX/WEBAPP/SPHPBLOG_FILE_UPLOAD |
last seen | 2020-03-11 |
modified | 2017-11-08 |
published | 2008-10-19 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2733 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/sphpblog_file_upload.rb |
title | Simple PHP Blog Remote Command Execution |
Nessus
NASL family | CGI abuses |
NASL id | SPHPBLOG_040.NASL |
description | The version of Simple PHP Blog installed on the remote host allows authenticated attackers to upload files containing arbitrary code to be executed with the privileges of the web server userid. In addition, it likely lets anyone retrieve its configuration file as well as the user list and to delete arbitrary files subject to the privileges of the web server user id. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19516 |
published | 2005-08-27 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19516 |
title | Simple PHP Blog <= 0.4.0 Multiple Vulnerabilities |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/82368/sphpblog_file_upload.rb.txt |
id | PACKETSTORM:82368 |
last seen | 2016-12-05 |
published | 2009-10-30 |
reporter | Matteo Cantoni |
source | https://packetstormsecurity.com/files/82368/Simple-PHP-Blog-0.4.0-Command-Execution.html |
title | Simple PHP Blog 0.4.0 Command Execution |