vendor:
PhotoPost vBGallery
by:
Cold z3ro
7.5
CVSS
HIGH
Remote File Upload
434
CWE
Product Name: PhotoPost vBGallery
Affected Version From: v2.x
Affected Version To: v2.x
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
vBulletin PhotoPost vBGallery v2.x Remote File Upload
The exploiter can upload a PHP shell via the upload.php script by renaming it to $name.php.wmv. The uploaded file will be in the user's account number folder. For example, if the user's account number is 4, the file path will be http://localhost/Forum/$gallery_path/files/4/$name.php.wmv. If the user's account number is 12345, the file path will be http://localhost/Forum/$gallery_path/files/1/2/3/4/5/$name.php.wmv.
Mitigation:
Ensure that the upload.php script is not accessible to unauthorized users and that the file uploads are properly validated.