CVE-2012-10056
BaseFortify
Publication date: 2025-08-13
Last updated on: 2025-08-14
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| php_volunteer_management_system | php_volunteer_management_system | 1.0.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2012-10056 is an arbitrary file upload vulnerability in PHP Volunteer Management System version 1.0.2. Authenticated users can upload files without restriction on file type or extension to a publicly accessible directory (mods/documents/uploads/). Because the directory lacks execution controls, attackers can upload malicious PHP scripts (such as backdoor shells) and execute them remotely. The application ships with default credentials (admin:volunteer), making it easy for attackers to authenticate and exploit this vulnerability. This allows attackers to gain unauthorized control over the server by uploading and executing arbitrary code. [1, 3, 4]
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including full system compromise. An attacker who authenticates using default credentials can upload malicious PHP payloads to the server and execute arbitrary code remotely. This can result in unauthorized access, data theft, server manipulation, and disruption of service. The attacker gains control over the webserver, potentially compromising confidentiality, integrity, and availability of the system and its data. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be performed by checking for the presence of uploaded PHP files in the 'mods/documents/uploads/' directory, especially files with timestamp-based randomized names. One can monitor HTTP requests to the upload endpoints such as 'index.php?p=upload_personal_document' or 'index.php?p=upload_shared_document' for suspicious POST requests containing PHP payloads. Additionally, attempts to access uploaded PHP files via GET requests can indicate exploitation. Commands to detect this include using curl or wget to test upload endpoints with authentication (default credentials admin:volunteer), and listing files in the uploads directory before and after uploads to identify new suspicious files. For example, using curl to login and upload a test file, then listing files via HTTP or direct filesystem access if available. Monitoring web server logs for POST requests to upload endpoints and GET requests to the uploads directory can also help detect exploitation. [1, 3, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Changing or disabling the default credentials (admin:volunteer) to prevent easy authentication by attackers. 2) Restricting or disabling the file upload functionality if not needed. 3) Implementing strict file type and extension validation on uploads to prevent uploading executable PHP files. 4) Applying access controls to the 'mods/documents/uploads/' directory to prevent execution of uploaded files, such as disabling PHP execution in that directory via web server configuration. 5) If possible, updating or patching the application to a version without this vulnerability or discontinuing use since the product is no longer supported. 6) Monitoring and auditing logs for suspicious activity related to uploads and access to uploaded files. [1, 3, 4, 2]