cpe:/a:achievo:achievo:1.2.0 cpe:/a:achievo:achievo:1.2.1 cpe:/a:achievo:achievo:1.3.0 cpe:/a:achievo:achievo:1.3.1 cpe:/a:achievo:achievo:1.3.2 CVE-2008-2742 2008-06-17T11:41:00.000-04:00 2017-09-28T21:31:17.897-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2008-06-17T14:06:00.000-04:00 ALLOWS_OTHER_ACCESS BID 29621 SECUNIA 30597 EXPLOIT-DB 5770 XF achievo-config-file-upload(42980) CONFIRM http://www.achievo.org/blog/archives/631-Achievo-1.3.3-Security-Release.html Unrestricted file upload in the mcpuk file editor (atk/attributes/fck/editor/filemanager/browser/mcpuk/connectors/php/config.php) in Achievo 1.2.0 through 1.3.2 allows remote attackers to execute arbitrary code by uploading a file with .php followed by a safe extension, then accessing it via a direct request to the file in the Achievo root directory. NOTE: this is only a vulnerability in environments that support multiple extensions, such as Apache with the mod_mime module enabled.