CVE-2009-4140
EXPLOITEDOpen Flash Chart v2 Beta 1-v2 Lug Wyrm Charmer - RCE
Title source: llmDescription
Unrestricted file upload vulnerability in ofc_upload_image.php in Open Flash Chart v2 Beta 1 through v2 Lug Wyrm Charmer, as used in Piwik 0.2.35 through 0.4.3, Woopra Analytics Plugin before 1.4.3.2, and possibly other products, when register_globals is enabled, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension through the name parameter with the code in the HTTP_RAW_POST_DATA parameter, then accessing it via a direct request to the file in tmp-upload-images/.
Exploits (8)
exploitdb
WORKING POC
VERIFIED
by iskorpitx · textwebappsphp
https://www.exploit-db.com/exploits/24969
metasploit
WORKING POC
GREAT
by Braeden Thomas · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/open_flash_chart_upload_exec.rb
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/openemr_upload_exec.rb
References (16)
Scores
EPSS
0.9109
EPSS Percentile
99.6%
Exploitation Intel
VulnCheck KEV
2014-05-06
Classification
Status
draft
Affected Products (11)
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
teethgrinder.co.uk/open_flash_chart
matomo/matomo
matomo/matomo
matomo/matomo
Timeline
Published
Dec 22, 2009
Tracked Since
Feb 18, 2026