PHP-Fusion 6.00.306 and earlier, running under Apache HTTP Server 1.3.27 and PHP 4.3.3, allows remote authenticated users to upload files of arbitrary types using a filename that contains two or more extensions that ends in an assumed-valid extension such as .gif, which bypasses the validation, as demonstrated by uploading then executing an avatar file that ends in ".php.gif" and contains PHP code in EXIF metadata.
CVSS v2.0 Score
6.4
/ 10.0
MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Information
- Published
- 12 mai 2006
- Updated
- 16 avr. 2026
- Status
- Modified
- Source
- cve@mitre.org
Affected products
php fusion php fusion
Versions : 6.00.3, 6.00.105, 6.00.106, 6.00.107, 6.00.109
Weaknesses (CWE)
NVD-CWE-Other
References (16)
- http://secunia.com/advisories/19992PatchVendor Advisory
- http://secunia.com/advisories/19992PatchVendor Advisory
- + 1 more references on NVD
Monitor your products
Get automatic alerts for every new CVE affecting your equipment.