Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022030080

Below is a copy:

Laravel Media Library Pro 2.1.6 Shell Upload
# Exploit Title: Laravel Media Library Pro <=2.1.6 - Arbitrary File Upload (Unauthenticated)
# Google Dork: -
# Date: Mar 13, 2022
# Exploit Author: Kelvin Yip <[email protected]>
# Vendor Homepage: https://spatie.be/ 
# Software Link: https://spatie.be/products/media-library-pro
# Version: <=1.17.10 & <=2.1.6
# Tested on: Laradock (PHP 8.0) inside Ubuntu 20.04
# CVE : CVE-2021-45040

#######################################################################################################
Description:

The Spatie media-library-pro library through 1.17.10 & 2.1.6 for Laravel allows remote attackers to upload executable files via the uploads route.

#######################################################################################################
Xploit : Arbitrary File Upload (Unauthenticated)

Default URL: http://server/api/media-library-pro/uploads OR http://server/media-library-pro/uploads

Note: The URL can be changed by developer. 

Upload a PHP webshell or shell file with 3 parameters: (uuid, name and file), the JSON response will contain original_url, access the URL in the browser to get the shell access.

#######################################################################################################
Additional Information for setup, test and solutions: https://cybersecthreat.com/2022/03/14/cve-2021-45040/
#######################################################################################################

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.