Unrestricted file upload vulnerability in repository/repository_attachment.php in AlienVault Open Source Security Information Management (OSSIM) 2.1.5, and possibly other versions before 2.1.5-4, allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in ossiminstall/uploads/.
References
Link | Resource |
---|---|
http://secunia.com/advisories/37727 | Vendor Advisory |
http://www.alienvault.com/community.php?section=News | Vendor Advisory |
http://www.cybsec.com/vuln/OSSIM_2_1_5%20_Arbitrary_File_Upload.pdf | Exploit |
http://secunia.com/advisories/37727 | Vendor Advisory |
http://www.alienvault.com/community.php?section=News | Vendor Advisory |
http://www.cybsec.com/vuln/OSSIM_2_1_5%20_Arbitrary_File_Upload.pdf | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-12-21 16:30
Updated : 2025-04-09 00:30
NVD link : CVE-2009-4373
Mitre link : CVE-2009-4373
CVE.ORG link : CVE-2009-4373
JSON object : View
Products Affected
alienvault
- open_source_security_information_management
CWE