vendor:
JAKCMS PRO
by:
EgiX
7.5
CVSS
HIGH
Remote Arbitrary File Upload
287
CWE
Product Name: JAKCMS PRO
Affected Version From: 2.2.2005
Affected Version To: 2.2.2005
Patch Exists: YES
Related CWE: N/A
CPE: a:jakcms:jakcms_pro
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 and Debian 6.0.2
2011
JAKCMS PRO <= 2.2.5 Remote Arbitrary File Upload Exploit
This authentication schema could be bypassed due to an attacker might be able to start a session accessing to /index.php that set for e.g. the 'jak_lastURL' session variable, so could be set $SESSION['check_session_variable'] to bypass the check at line 125. Successful exploitation allows attackers access to plugins functionality (see /js/editor/plugins/jakadminexplorer/php/action.php), in this way an attacker could be able to 'delete', 'create', 'rename' any folder/file into webserver or upload arbitrary files. The same vulnerability afflicts also jakadminimage, jakusrexplorer and jakusrimage plugins.
Mitigation:
Ensure that authentication is properly implemented and enforced.