CVE-2012-10056
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-13

Last updated on: 2025-08-14

Assigner: VulnCheck

Description
PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-13
Last Modified
2025-08-14
Generated
2026-05-06
AI Q&A
2025-08-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
php_volunteer_management_system php_volunteer_management_system 1.0.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2012-10056 is an arbitrary file upload vulnerability in PHP Volunteer Management System version 1.0.2. Authenticated users can upload files without restriction on file type or extension to a publicly accessible directory (mods/documents/uploads/). Because the directory lacks execution controls, attackers can upload malicious PHP scripts (such as backdoor shells) and execute them remotely. The application ships with default credentials (admin:volunteer), making it easy for attackers to authenticate and exploit this vulnerability. This allows attackers to gain unauthorized control over the server by uploading and executing arbitrary code. [1, 3, 4]


How can this vulnerability impact me? :

This vulnerability can lead to severe impacts including full system compromise. An attacker who authenticates using default credentials can upload malicious PHP payloads to the server and execute arbitrary code remotely. This can result in unauthorized access, data theft, server manipulation, and disruption of service. The attacker gains control over the webserver, potentially compromising confidentiality, integrity, and availability of the system and its data. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by checking for the presence of uploaded PHP files in the 'mods/documents/uploads/' directory, especially files with timestamp-based randomized names. One can monitor HTTP requests to the upload endpoints such as 'index.php?p=upload_personal_document' or 'index.php?p=upload_shared_document' for suspicious POST requests containing PHP payloads. Additionally, attempts to access uploaded PHP files via GET requests can indicate exploitation. Commands to detect this include using curl or wget to test upload endpoints with authentication (default credentials admin:volunteer), and listing files in the uploads directory before and after uploads to identify new suspicious files. For example, using curl to login and upload a test file, then listing files via HTTP or direct filesystem access if available. Monitoring web server logs for POST requests to upload endpoints and GET requests to the uploads directory can also help detect exploitation. [1, 3, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Changing or disabling the default credentials (admin:volunteer) to prevent easy authentication by attackers. 2) Restricting or disabling the file upload functionality if not needed. 3) Implementing strict file type and extension validation on uploads to prevent uploading executable PHP files. 4) Applying access controls to the 'mods/documents/uploads/' directory to prevent execution of uploaded files, such as disabling PHP execution in that directory via web server configuration. 5) If possible, updating or patching the application to a version without this vulnerability or discontinuing use since the product is no longer supported. 6) Monitoring and auditing logs for suspicious activity related to uploads and access to uploaded files. [1, 3, 4, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart