Description
Multiple vendor applications utilize FCKeditor. FCKeditor contains functionality to handle file uploads and file management. A remote attacker could use this functionality to upload malicious executable files on the system. To test file upload capabilities, Acunetix created a file named Acunetix_WVS_File_Upload_test.txt on the server.
Remediation
It is recommended to disable the file upload functionality in FCKeditor (if not required).
References
Related Vulnerabilities
WordPress Plugin Real WYSIWYG 'insert_file.php' Arbitrary File Upload (0.0.2)
WordPress Plugin Mail Masta Local File Inclusion (1.0)
WordPress Plugin AIT Themes-CSV Import/Export Arbitrary File Upload (3.0.3)
Nginx PHP code execution via FastCGI
WordPress Plugin InPost Gallery Multiple Vulnerabilities (2.1.2)