CVE-2012-10052
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-08

Last updated on: 2025-08-08

Assigner: VulnCheck

Description
EGallery version 1.2 contains an unauthenticated arbitrary file upload vulnerability in the uploadify.php script. The application fails to validate file types or enforce authentication, allowing remote attackers to upload malicious PHP files directly into the web-accessible egallery/ directory. This results in full remote code execution under the web server context.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-08
Last Modified
2025-08-08
Generated
2026-05-06
AI Q&A
2025-08-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
egallery egallery 1.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

EGallery version 1.2 has a vulnerability in the uploadify.php script that allows attackers to upload files without authentication and without validating the file type. This means an attacker can upload malicious PHP files directly into the web-accessible directory, leading to full remote code execution on the web server.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary code on your web server remotely, potentially taking full control of the server, accessing sensitive data, defacing the website, or using the server to launch further attacks.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately restrict or disable the uploadify.php script to prevent unauthenticated file uploads. Implement proper authentication and file type validation to ensure only allowed file types can be uploaded. Additionally, restrict write permissions to the egallery/ directory to prevent unauthorized file uploads and consider applying web server security controls to limit execution of uploaded files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart