header-logo
Suggest Exploit
vendor:
Zyke CMS
by:
indoushka
9,3
CVSS
HIGH
Remote File Upload Vulnerability
434
CWE
Product Name: Zyke CMS
Affected Version From: V1.0
Affected Version To: V1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:zyke_cms:zyke_cms:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2010

Zyke CMS V1.0 Remote File Upload Vulnerability

A vulnerability in Zyke CMS V1.0 allows an attacker to upload malicious files to the server. The vulnerability exists due to insufficient validation of user-supplied input in the 'controlpanel.php' script. A remote attacker can upload arbitrary files to the server, which can be used to execute arbitrary code on the vulnerable system.

Mitigation:

Ensure that user-supplied input is properly validated and sanitized before being used in the application. Ensure that the application is running with the least privileges necessary.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : Zyke CMS V1.0 Remote File Upload Vulnerability           
| # Author   : indoushka                                                               
| # email    : indoushka@hotmail.com                                                   
| # Home     : www.iqs3cur1ty.com/vb                                                                                                                                                                                                             
| # Script   : Powered by ZykeCMS 2010       
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : Mullti     
| # Download : freewebtown.com/indoushka                                                            
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
 1- Upload :
 
 http://127.0.0.1/ZykeCMSV1.0/admin/controlpanel.php
 
 http://127.0.0.1/ZykeCMSV1.0/images/logo/
 

Dz-Ghost Team ===== Saoucha * Star08 * Redda * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ====================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com *  www.alkrsan.net * www.mormoroth.net * MR.SoOoFe * ThE g0bL!N
------------------------------------------------------------------------------------------------------------------------