Vulnerability identifier: #VU40965
Vulnerability risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2014-9567
CWE-ID:
CWE-94
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
ProjectSend
Web applications /
Other software
Vendor: ProjectSend
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
Mitigation
Install update from vendor's website.
Vulnerable software versions
ProjectSend: 100 - 561
External links
https://osvdb.org/show/osvdb/116469
https://packetstormsecurity.com/files/129759/ProjectSend-Arbitrary-File-Upload.html
https://www.exploit-db.com/exploits/35424
https://www.exploit-db.com/exploits/35660
https://exchange.xforce.ibmcloud.com/vulnerabilities/99548
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.