jQuery PHP Arbitrary Upload

2014-06-24 / 2014-07-08
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-264

[+] Arbitrary Upload on jQuery/PHP [+] Date: 23/06/2014 [+] Risk: High [+] CWE Number : CWE-264 [+] Author: Felipe Andrian Peixoto [+] Vendor Homepage: http://rafaelcouto.com.br/upload-dinamico-com-php-jquery/#sthash.uVv21WU9.dpuf [+] Contact: felipe_andrian@hotmail.com [+] Tested on: Windows 7 and Linux [+] Dork: "Upload dinmico com jQuery/PHP" [+] Exploit : http://host/patch/upload.php [+] PoC: http://www.agendXavisual.com/php/uploads_multiplos_1_modific/upload.php http://www.agenXdavisual.com/php/uploads_multiplos_1_modific/uploads/e3b334538b7fc18a74286412bc388010.txt http://lagodoy.nXo-ip.biz/projetos/lagodoy/upload_dinamico/upload.php http://lagodoyX.no-ip.biz/projetos/lagodoy/upload_dinamico/uploads/03cd4c9a05c8b2a4b2ede68a7b4a5fdb.txt http://estatisXtica.br/caem/mostra2013/formularios/upload_comprovante.php http://estatiXstica.br/caem/mostra2013/formularios/uploads/573437f23846bacf89c7e37193cfd224.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top