FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

BID:12676

Info

FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

Bugtraq ID: 12676
Class: Input Validation Error
CVE:
Remote: Yes
Local: No
Published: Feb 28 2005 12:00AM
Updated: Feb 28 2005 12:00AM
Credit: Discovery is credited to Roberto Cehennem <[email protected]>.
Vulnerable: FCKeditor FCKeditor 2.0 RC2
Not Vulnerable: FCKeditor FCKeditor 2.0 rc3

Discussion

FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

It is reported that FCKeditor allows remote attackers to upload arbitrary files to a computer when it is used with PHP-Nuke. This issue may allow attackers to place malicious scripts on a server, which can lead to various attacks.

FCKeditor 2.0 RC2 running as a module for PHP-Nuke is reported prone to this issue. Other versions may be affected as well.

Exploit / POC

FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

An exploit is not required.

It is reported that the following actions can allow for arbitrary file uploads:
Access the script:
http://www.example.com/modules.php?name=FCKeditor
Click on "upload image"
Click at "search at server"
Upload the file.

Solution / Fix

FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

Solution:
The vendor has released version 2.0 RC3 and a patch to address this issue. Registered users may obtain the patch from the following location:

http://www.phpnuker.de/phpnuker-details-1805-fixFCK2RC2_Upload_Image-Link.html

Fixes are linked below:


FCKeditor FCKeditor 2.0 RC2

References

FCKeditor For PHP-Nuke Arbitrary File Upload Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report