Description
Unrestricted file upload vulnerability in plog-admin/plog-upload.php in Plogger 1.0 RC1 and earlier allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file and a non-zero length PNG file, then accessing the PHP file via a direct request to it in plog-content/uploads/archive/.
Exploits (1)
References (6)
Core 6
Core References
Various Sources x_refsource_misc
https://www.sysdream.com/CVE-2014-2223_CVE-2014-2224
Exploit x_refsource_misc
https://www.sysdream.com/system/files/PLOGGER-1.0RC1-advisory.pdf
Mailing List mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2014/q1/443
Exploit mailing-list
x_refsource_mlist
http://seclists.org/oss-sec/2014/q1/446
Exploit x_refsource_misc
http://packetstormsecurity.com/files/128029/Plogger-Authenticated-Arbitrary-File-Upload.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34447
Scores
EPSS
0.1044
EPSS Percentile
93.3%
Details
CWE
CWE-94
Status
published
Products (1)
plogger/plogger
< 1.0
Published
Sep 11, 2014
Tracked Since
Feb 18, 2026