vendor:
Kusaba
by:
Sausage
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Kusaba
Affected Version From: 1.0.4
Affected Version To: 1.0.4
Patch Exists: NO
Related CWE: N/A
CPE: a:kusaba:kusaba:1.0.4
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Kusaba <= 1.0.4 Remote Code Execution Exploit #2
This exploit will work if the target has left the load_receiver.php script un-edited. After execution, the attacker can execute arbitrary code by sending a POST request to post.php with the parameters 'pc' or 'sc'. The attacker can also use a backdoor from the paint_save.php exploit.
Mitigation:
Ensure that the load_receiver.php script is edited and that the backdoor from the paint_save.php exploit is removed.