CVE-2012-10052
Severity CVSS v4.0:
CRITICAL
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
08/08/2025
Last modified:
08/08/2025
Description
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- http://web.archive.org/web/20170128123244/http://www.opensyscom.fr/Actualites/egallery-arbitrary-file-upload-vulnerability.html
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/egallery_upload_exec.rb
- https://sourceforge.net/projects/e-gallery/
- https://www.exploit-db.com/exploits/20029
- https://www.vulncheck.com/advisories/egallery-arbitrary-php-file-upload
- http://web.archive.org/web/20170128123244/http://www.opensyscom.fr/Actualites/egallery-arbitrary-file-upload-vulnerability.html
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/egallery_upload_exec.rb
- https://www.exploit-db.com/exploits/20029



