Advertisement






ЯрНео Разработка сайтов Yarneo WebDesign Unauthorized File Insertion

CVE Category Price Severity
N/A CWE-264 N/A High
Author Risk Exploitation Type Date
Unknown High Remote 2019-05-21
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.983223 0.997

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050232

Below is a copy:

Yarneo WebDesign Unauthorized File Insertion
####################################################################

# Exploit Title :    Yarneo WebDesign Unauthorized File Insertion
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 21/05/2019
# Vendor Homepage : yarneo.ru
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description About Software :
*****************************
Yarneo is a Web Design and Development Company in Russia.

####################################################################

# Impact :
***********
Yarneo is prone to a vulnerability that lets attackers upload arbitrary files because 
it fails to adequately sanitize user-supplied input. 

An attacker can exploit this vulnerability to upload arbitrary code and execute
it in the context of the webserver process. This may facilitate unauthorized access 
or privilege escalation; other attacks are also possible.

####################################################################

# Arbitrary File Upload / Unauthorized File Insert Exploit :
**************************************************
/fckeditor/editor/filemanager/connectors/uploadtest.html

Select the "File Uploader" to use : Choose PHP and upload your file.

Directory File Path :
**********************
/pic/userfile/[YOURFILENAME].txt .jpg .gif .png

####################################################################

# Example Vulnerable Sites :
************************
[+] xn--1-7sb3aeok0dwc.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html

[+] xn--l1adfni2d.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html

[+] xn--90auhhdlh4g.xn--p1ai/fckeditor/editor/filemanager/connectors/uploadtest.html

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum