CVE-2014-2223
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
11/09/2014
Last modified:
12/04/2025
Description
Unrestricted file upload vulnerability in plog-admin/plog-upload.php in Plogger 1.0 RC1 and earlier allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file and a non-zero length PNG file, then accessing the PHP file via a direct request to it in plog-content/uploads/archive/.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:plogger:plogger:*:rc1:*:*:*:*:*:* | 1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html
- http://seclists.org/oss-sec/2014/q1/443
- http://seclists.org/oss-sec/2014/q1/446
- http://www.exploit-db.com/exploits/34447
- https://www.sysdream.com/CVE-2014-2223_CVE-2014-2224
- https://www.sysdream.com/system/files/PLOGGER-1.0RC1-advisory.pdf
- http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html
- http://seclists.org/oss-sec/2014/q1/443
- http://seclists.org/oss-sec/2014/q1/446
- http://www.exploit-db.com/exploits/34447
- https://www.sysdream.com/CVE-2014-2223_CVE-2014-2224
- https://www.sysdream.com/system/files/PLOGGER-1.0RC1-advisory.pdf



