6.8
CVSSv2

CVE-2011-5195

Published: 23/09/2012 Updated: 20/09/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross-site request forgery (CSRF) vulnerability in index/manager/fileUpload in Public Knowledge Project Open Conference Systems 2.3.4 and previous versions allows remote malicious users to hijack the authentication of administrators for requests that upload a PHP file.

Vulnerable Product Search on Vulmon Subscribe to Product

public knowledge project open conference systems 2.0

public knowledge project open conference systems 1.1.7

public knowledge project open conference systems 1.1.6

public knowledge project open conference systems 1.1.5

public knowledge project open conference systems 2.3.1

public knowledge project open conference systems 2.3

public knowledge project open conference systems 2.1.2-1

public knowledge project open conference systems 2.1.2

public knowledge project open conference systems 2.1.1.-2

public knowledge project open conference systems 1.1

public knowledge project open conference systems 1.0

public knowledge project open conference systems

public knowledge project open conference systems 2.3.3

public knowledge project open conference systems 2.1.1-1

public knowledge project open conference systems 2.1.0-1

public knowledge project open conference systems 1.1.3

public knowledge project open conference systems 1.1.1

public knowledge project open conference systems 2.3.3-1

public knowledge project open conference systems 2.3.2

public knowledge project open conference systems 2.1.1

public knowledge project open conference systems 2.1

public knowledge project open conference systems 1.1.4

public knowledge project open conference systems 1.1.2

Exploits

#!/usr/bin/python # # Open Conference/Journal/Harvester Systems <= 23X multiple remote code execution vulnerabilities # vendor_________: Public Knowledge Project (pkp) -pkpsfuca/ # software link__: pkpsfuca/download # author_________: mr_me::rwx kru # email__________: steventhomasseeley!gmail!com # tested on______: the interw ...