doorGets CMS 7.0 Unrestricted File Upload Vulnerability

2019.02.08
dz indoushka (DZ) dz
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

==================================================================================================================================== | # Title : doorGets CMS 7.0 Unrestricted File Upload Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) | | # Vendor : https://doorgets.io/t/en/ | | # Dork : "Powered with doorGets ™" | ==================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine. [+] Register new user . http://bestwayschool.com/dg-user/en/?controller=authentification&action=register [+] Confirmation link in the email. [+] After login go to manage your profile http://elimu7.com/eXplored/dg-user/en/?controller=account [+] From paramaters Choose an HTML editor ( editor tinymce ) & press Save . [+] Creat new Blog http://elimu7.com/eXplored/dg-user/en/?controller=moduleblog&uri=blog&action=add [+] insert image they give you roxy file browser upload your Ev!l .php2 .html .svg ... [+] http://www.alnadabi.net/fileman/Uploads/ Greetings to :========================================================================================================================= | jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | | =======================================================================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top