Description
Multiple PHP file include vulnerabilities in ezUpload 2.2 allow remote attackers to execute arbitrary code via the path parameter to (1) initialize.php, (2) customize.php, (3) form.php, or (4) index.php.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26141
exploitdb
WORKING POC
VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26140
exploitdb
WORKING POC
VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26143
exploitdb
WORKING POC
VERIFIED
by Johnnie Walker · textwebappsphp
https://www.exploit-db.com/exploits/26142
References (6)
Core 6
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16434
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14534
Exploit, Vendor Advisory x_refsource_misc
http://www.securiteam.com/exploits/5JP0J15GKU.html
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/1379
Exploit x_refsource_misc
http://packetstorm.linuxsecurity.com/0508-exploits/ezuploadRemote.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1014723
Scores
EPSS
0.2009
EPSS Percentile
95.5%
Details
Status
published
Products (1)
ezupload/ezupload
2.2
Published
Aug 17, 2005
Tracked Since
Feb 18, 2026