---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Multiple Getaphpsite Products File Upload Vulnerability SECUNIA ADVISORY ID: SA32777 VERIFY ADVISORY: http://secunia.com/advisories/32777/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Getaphpsite Auto Dealers http://secunia.com/advisories/product/20554/ Getaphpsite Real Estate http://secunia.com/advisories/product/20555/ DESCRIPTION: ZoRLu has reported a vulnerability in multiple Getaphpsite products, which can be exploited by malicious users to compromise a vulnerable system. The vulnerability is caused due to the profie.php script failing to validate the types of uploaded logos. This can be exploited to upload files with arbitrary extensions (e.g. ".php") and execute arbitrary PHP code on the server. This vulnerability is reported in the following products: - Getaphpsite Auto Dealers - Getaphpsite Real Estate SOLUTION: Edit the source code to ensure that input is properly verified. PROVIDED AND/OR DISCOVERED BY: ZoRLu ORIGINAL ADVISORY: http://milw0rm.com/exploits/7188 http://milw0rm.com/exploits/7189 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------