HelpDeskZ = v1.0.2 – Unauthenticated Shell Upload
HelpDeskZ = v1.0.2 suffers from an unauthenticated shell upload vulnerability. The software in the default configuration allows upload for .php-Files ( !! ). I think the developers thought it was no risk, because the filenames get obfuscated when they are uploaded. However, there is a weakness in the rename function of the uploaded file controllers httpsgithub.comevolutionscriptHelpDeskZ-1.0tree006662bb856e126a38f2bb76df44a2e4e3d37350controllerssubmit_ticket_controller.php - Line 141 $filename = md5($_FILES['attachment']['name'].time())...$ext; So by guessing the time the file was uploaded, we can get RCE. Steps to reproduce: httplocalhosthelpdeskzv=submit_ticket&action=displayForm Enter anything in the mandatory fields, attach your phpshell.php, solve the captcha and submit your ticket. Call this script with the base url of your HelpdeskZ-Installation and the name of the file you uploaded exploit.py httplocalhosthelpdeskz phpshell.php