header-logo
Suggest Exploit
vendor:
ActiveWeb Professional
by:
SecurityFocus
9.3
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: ActiveWeb Professional
Affected Version From: 3
Affected Version To: 3
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

ActiveWeb Professional Arbitrary File Upload Vulnerability

ActiveWeb Professional is prone to an arbitrary-file-upload vulnerability because the application fails to adequately sanitize user-supplied input. An attacker may leverage this issue to upload arbitrary files to the affected computer; successful exploits will allow attackers to completely compromise the affected computer. The exploit involves going to the page http://www.example.com/activeweb/EasyEdit.cfm?module=EasyEdit&page=getimagefile&Filter=, changing the 'UploadDirectory' and 'Accepted Extensions' hidden form fields to upload the malicious file to the directory of interest, and submitting the form.

Mitigation:

Input validation should be used to ensure that only properly formed data is accepted.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/45985/info

ActiveWeb Professional is prone to an arbitrary-file-upload vulnerability because the application fails to adequately sanitize user-supplied input.

An attacker may leverage this issue to upload arbitrary files to the affected computer; successful exploits will allow attackers to completely compromise the affected computer.

Lomtec ActiveWeb Professional 3.0 is vulnerable; other versions may also be affected. 

1. Go to the page http://www.example.com/activeweb/EasyEdit.cfm?module=EasyEdit&page=getimagefile&Filter=

2. Change the 'UploadDirectory' and 'Accepted Extensions' hidden form fields to upload the malicious file to the directory of interest.