Advertisement






Netvidade Portugal Unauthorized File Insertion

CVE Category Price Severity
N/A CWE-264 $500 Critical
Author Risk Exploitation Type Date
Unknown High Remote 2019-05-21
CPE
cpe:cpe:/a:netvidade:portugal:unauthorized_file_insertion
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N 0.078 0.73142

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050223

Below is a copy:

Netvidade Portugal Unauthorized File Insertion
####################################################################

# Exploit Title : Netvidade Portugal Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : netvidade.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : intext:Desenvolvido por netvidade.com site:pt
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description About Software :
*****************************
NetVidade is a Portugal Web Design and Development Company.

####################################################################

# Impact :
***********
Desenvolvido Por Netvidade Portugal is prone to a vulnerability that lets attackers 
upload arbitrary files because it fails to adequately sanitize user-supplied input. 

An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access 
or privilege escalation; other attacks are also possible.

####################################################################

# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/plugins/fckeditor/editor/filemanager/connectors/uploadtest.html

Directory File Path :
**********************
/ficheiros/conteudos/[YOURFILENAME].txt .jpg .gif .png

####################################################################

# Example Vulnerable Sites :
************************
[+] prolixo.eu/plugins/fckeditor/editor/filemanager/connectors/uploadtest.html

[+] sunsilhotel.com/plugins/fckeditor/editor/filemanager/connectors/uploadtest.html

[+] projilinha.pt/plugins/fckeditor/editor/filemanager/connectors/uploadtest.html

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum