header-logo
Suggest Exploit
vendor:
N/A
by:
DigitALL
9,3
CVSS
HIGH
WebAdmin Shell Upload
264
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

WebAdmin Shell Upload Vulnerability

This vulnerability allows an attacker to upload a malicious shell to a vulnerable web server. The attacker can then use the shell to gain access to the server and execute arbitrary code. The vulnerability is caused by a lack of proper input validation in the webadmin.php script, which allows an attacker to upload a malicious file to the server.

Mitigation:

The best way to mitigate this vulnerability is to ensure that proper input validation is implemented in the webadmin.php script. This can be done by ensuring that only valid file types are allowed to be uploaded, and that the uploaded files are scanned for malicious content.
Source

Exploit-DB raw data:

# Exploit Title: WebAdmin Shell Upload Vulnerability

# Date: 16.04.2010

# Author: DigitALL

# Code :

g00gle d0rk: inurl:webadmin.php Size · Permission · Owner · Group,
Functions.

3xpl0it: You Edit index.php Or Shell Upload

Greetz To: Efe KroNicKq NoFearx38 and All 1923Turk.Com Members

[ www.digitallsecurity.org ] [ www.1923turk.com ] [
www.digit4ll.blogspot.com ] [ www.kankardes.com ] [ www.hacker-zone.org ]