CVE-2014-9567

ProjectSend <r561 - RCE

Title source: llm

Description

Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.

Exploits (3)

exploitdb WORKING POC
by Fady Mohammed Osman · pythonwebappsphp
https://www.exploit-db.com/exploits/35424
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/35660
metasploit WORKING POC EXCELLENT
by Fady Mohammed Osman, bcoles · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/projectsend_upload_exec.rb

Scores

EPSS 0.8289
EPSS Percentile 99.2%

Classification

CWE
CWE-94
Status draft

Affected Products (15)

projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend

Timeline

Published Jan 07, 2015
Tracked Since Feb 18, 2026