vendor:
Remont
by:
El-Kahina
8,8
CVSS
HIGH
Upload
434
CWE
Product Name: Remont
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows SP2 Fran�ais V.(Pnx2 2.0) + Lunix Fran�ais v.(9.4 Ubuntu)
2020
Torrent Hoster Remont Upload Exploit
An attacker can exploit a vulnerability in Torrent Hoster Remont to upload malicious files. The vulnerability exists in the 'upload.php' file, which allows an attacker to upload a malicious file without any authentication. The malicious file can be uploaded by using the 'upfile' parameter in the 'upload.php' file. The malicious file can then be accessed by visiting the 'torrents' directory. Additionally, an attacker can also exploit an XSS vulnerability in the 'forgot_password.php' file to execute malicious JavaScript code.
Mitigation:
The application should validate the file type before allowing the file to be uploaded. Additionally, the application should also validate the input parameters to prevent XSS attacks.