vendor:
Microweber
by:
Gjoko 'LiquidWorm' Krstic
8.8
CVSS
HIGH
Authenticated Arbitrary Command Execution
78
CWE
Product Name: Microweber
Affected Version From: 1.0.3
Affected Version To: 1.0.3
Patch Exists: YES
Related CWE: N/A
CPE: a:microweber_team:microweber:1.0.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apache 2.4.10 (Win32), PHP 5.6.3, MySQL 5.6.21
2015
Microweber v1.0.3 File Upload Filter Bypass Remote PHP Code Execution
Microweber suffers from an authenticated arbitrary command execution vulnerability. The issue is caused due to the improper verification when uploading files in '/src/Microweber/functions/plupload.php' script. This can be exploited to execute arbitrary PHP code by bypassing the extension restriction by putting the dot character at the end of the filename and uploading a malicious PHP script file that will be stored in '/userfiles/media/localhost/uploaded' directory.
Mitigation:
Ensure that proper input validation is performed when uploading files.