vendor:
JMX2 Email Tester
by:
hahwul
5.5
CVSS
MEDIUM
Web Shell Upload
434
CWE
Product Name: JMX2 Email Tester
Affected Version From: unknown
Affected Version To: unknown
Patch Exists: NO
Related CWE: none
CPE:
Platforms Tested: Debian (wheezy)
2016
JMX2 Email Tester – Web Shell Upload(save_email.php)
This exploit allows an attacker to upload a web shell using the 'save_email.php' file in the JMX2 Email Tester application. By providing a target URL and PHP code, the attacker can execute arbitrary commands on the target system.
Mitigation:
To mitigate this vulnerability, ensure that the JMX2 Email Tester application is up to date and all security patches have been applied. Additionally, restrict access to the application to trusted users only and regularly monitor for any unauthorized activity.