Advertisement






doorGets CMS 7.0 Unrestricted File Upload Vulnerability

CVE Category Price Severity
N/A CWE-434 N/A High
Author Risk Exploitation Type Date
Unknown Critical Remote 2019-02-08
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.521 0.89754

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019020075

Below is a copy:

doorGets CMS 7.0 Unrestricted File Upload Vulnerability
====================================================================================================================================
| # Title     : doorGets CMS 7.0 Unrestricted File Upload Vulnerability                                                            |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 65.0(32-bit)                                               | 
| # Vendor    : https://doorgets.io/t/en/                                                                                          |  
| # Dork      : "Powered with doorGets "                                                                                          |
====================================================================================================================================

poc :


[+] Dorking n Google Or Other Search Enggine.

[+] Register new user . http://bestwayschool.com/dg-user/en/?controller=authentification&action=register

[+] Confirmation link in the email.

[+] After login go to manage your profile http://elimu7.com/eXplored/dg-user/en/?controller=account 

[+] From paramaters Choose an HTML editor ( editor tinymce ) & press Save .

[+] Creat new Blog http://elimu7.com/eXplored/dg-user/en/?controller=moduleblog&uri=blog&action=add

[+]  insert image they give you roxy file browser upload your Ev!l .php2 .html .svg ...

[+]  http://www.alnadabi.net/fileman/Uploads/


Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.