This Metasploit module exploits an authenticated file upload vulnerability in Subrion CMS versions 4.2.1 and lower. The vulnerability is caused by the .htaccess file not preventing the execution of .pht, .phar, and .xhtml files. Files with these extensions are not included in the .htaccess blacklist, hence these files can be uploaded and executed to achieve remote code execution. In this module, a .phar file with a randomized name is uploaded and executed to receive a Meterpreter session on the target, then deletes itself afterwards.
72859313ffb21cb022d15b4566fe8863b0a0f88f5ef2dff2e8c3eba2e934c2ce
WordPress wpDiscuz plugin version 7.0.4 unauthenticated remote code execution exploit.
aa63e68f2bfdeedda7921d223b7b89c35603743db979d8834247d72fc6863c1e
Subrion CMS version 4.2.1 file upload bypass exploit that uploads a shell.
a8dc69971c84f2d358d2043b54d854b585028b195fc8de3cc1b57d75eb01c988
ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Windows targets.
9210869fa94e41f6f6ef63aecc9d1ebbba972eb5a529c95dadfb1239861731d7
ScadaBR versions 1.0 and 1.1CE authenticated shell upload exploit written for Linux targets.
2a0345665dc52ccee413e7c98da586cf603e0e659c5a93adc4f3788c3ff1795e
OpenPLC WebServer version 3 authentication remote code execution exploit.
682f96df1b4b8a0f370853102a14e7e97bdfde73f5dd8b8422985361a73161e4
ZeroShell version 3.9.0 remote command execution exploit.
96c5da86a5778d99416aad82b1040be38451d87a9ecabe804150409665073dbd
OpenPLC version 3 authenticated remote code execution exploit.
65b0210385b608740a93271d55b93113eacb1472f424450c8a33864212b6c54d
ScadaBR version 1.0 suffers from multiple remote shell upload vulnerabilities.
5a92eb4823ed57475fc7effdb2bab98ce6c8f49ffe4b3e5aedd0a9a183c94428