TITLE: CRE Loaded "files.php" File Upload Security Issue SECUNIA ADVISORY ID: SA18648 VERIFY ADVISORY: http://secunia.com/advisories/18648/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: CRE Loaded 6.x http://secunia.com/product/7173/ DESCRIPTION: kaneda has discovered a security issue in CRE Loaded, which can be exploited by malicious people to compromise a vulnerable system. The problem is that it is possible to access the "/admin/htmlarea/popups/file/files.php" script directly without being authenticated as the administrator. This can be exploited to upload arbitrary files to a location inside the web root (e.g. a PHP script), and create or delete arbitrary files and directories. The security issue has been confirmed in version 6.15. Other versions may also be affected. SOLUTION: Restrict access to the "/admin/htmlarea/popups/file/files.php" script. PROVIDED AND/OR DISCOVERED BY: kaneda ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------