####################################################################
# Exploit Title : Ctecia ComputerTechnologies Experts Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : ctecia.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Description About Software :
*****************************
Ctecia ComputerTechnologies Experts is Web Design Company in Portugal.
####################################################################
# Impact :
***********
Ctecia ComputerTechnologies Experts is prone to a vulnerability that lets attackers
upload arbitrary files because it fails to adequately sanitize user-supplied input.
An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access
or privilege escalation; other attacks are also possible.
####################################################################
# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/FCKeditor/editor/filemanager/upload/test.html
Select the "File Uploader" to use : Choose PHP and upload your file.
Directory File Path :
**********************
/FCKeditor_upload/[YOURFILENAME].txt .jpg .gif .png
####################################################################
# Example Vulnerable Sites :
************************
[+] bmgtours.com/FCKeditor/editor/filemanager/upload/test.html
####################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################