7.5
CVE-2014-9567
- EPSS 82.89%
- Veröffentlicht 07.01.2015 18:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Projectsend ≫ Projectsend Version100
Projectsend ≫ Projectsend Version102
Projectsend ≫ Projectsend Version105
Projectsend ≫ Projectsend Version110
Projectsend ≫ Projectsend Version155
Projectsend ≫ Projectsend Version156
Projectsend ≫ Projectsend Version157
Projectsend ≫ Projectsend Version161
Projectsend ≫ Projectsend Version180
Projectsend ≫ Projectsend Version335
Projectsend ≫ Projectsend Version375
Projectsend ≫ Projectsend Version405
Projectsend ≫ Projectsend Version412
Projectsend ≫ Projectsend Version514
Projectsend ≫ Projectsend Version561
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 82.89% | 0.992 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.