vendor:
eggBlog
by:
Pokk3rs
8,8
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: eggBlog
Affected Version From: 4.1.2
Affected Version To: 4.1.2
Patch Exists: NO
Related CWE: N/A
CPE: eggblog:eggblog
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 8 Pro x64
2013
eggBlog Arbitrary File Upload Vulnerability
An arbitrary file upload vulnerability exists in eggBlog, which allows an attacker to upload a malicious file to the server. By using the Google Dork “powered by eggBlog.net”, an attacker can find vulnerable websites. The attacker can then access the vulnerable URL http://server/[path]/_lib/openwysiwyg/addons/imagelibrary/insert_image.php?wysiwyg= and upload a malicious file, such as a PHP shell, as a .jpg file. The malicious file can then be accessed at http://server/[path]/photos/uploads/shell.php.jpg.
Mitigation:
Ensure that the application is configured to only allow the upload of files with the appropriate file extensions. Additionally, ensure that the application is configured to only allow the upload of files to a directory outside of the web root.