CVE-2014-9567
ProjectSend <r561 - RCE
Title source: llmDescription
Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.
Exploits (3)
exploitdb
WORKING POC
by Fady Mohammed Osman · pythonwebappsphp
https://www.exploit-db.com/exploits/35424
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/35660
metasploit
WORKING POC
EXCELLENT
by Fady Mohammed Osman, bcoles · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/projectsend_upload_exec.rb
References (5)
Scores
EPSS
0.8289
EPSS Percentile
99.2%
Classification
CWE
CWE-94
Status
draft
Affected Products (15)
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
projectsend/projectsend
Timeline
Published
Jan 07, 2015
Tracked Since
Feb 18, 2026