exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,029 RSS Feed

File Upload Files

Apache Tomcat AJP File Read
Posted Aug 31, 2024
Authored by SunCSR, A Security Researcher of Chaitin Tech | Site metasploit.com

When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP. Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

tags | exploit, remote, web, arbitrary, code execution, protocol, file upload
advisories | CVE-2020-1938
SHA-256 | f20ed46e990bc49e51e4df52537ec564d571907ef6c1bab6631f3044e0db35c8
HP ProCurve SNAC Domain Controller Credential Dumper
Posted Aug 31, 2024
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module will extract Domain Controller credentials from vulnerable installations of HP SNAC as distributed with HP ProCurve 4.00 and 3.20. The authentication bypass vulnerability has been used to exploit remote file uploads. This vulnerability can be used to gather important information handled by the vulnerable application, like plain text domain controller credentials. This Metasploit module has been tested successfully with HP SNAC included with ProCurve Manager 4.0.

tags | exploit, remote, bypass, file upload
SHA-256 | aed454bc14ce73f32076d32a64079806c8be0da490907a6f04fd8ad00e038838
Water Billing Management System 1.0 Cross Site Request Forgery / File Upload
Posted Aug 30, 2024
Authored by indoushka

Water Billing Management System version 1.0 suffers from a cross site request forgery that enables an arbitrary file upload.

tags | exploit, arbitrary, file upload, csrf
SHA-256 | b2b6b9ccd306227cb678af1bbff8e4fca60932e849a1f798914a7c8e6a43a1de
File Management System 1.0 Arbitrary File Upload
Posted Aug 28, 2024
Authored by indoushka

File Management System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | d7190aeb73675b4c80d6ccca7878d2547c38a9ee67ce2c6eb9c502dbff60d004
CMS RIMI 1.3 Cross Site Request Forgery / File Upload
Posted Aug 23, 2024
Authored by indoushka

CMS RIMI version 1.3 suffers from cross site request forgery and arbitrary file upload vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload, csrf
SHA-256 | dc50ee27904a926af74bf8f7250aab4eeedc989557ba1792b18fa14c73568744
Online Banking System 1.0 Arbitrary File Upload
Posted Aug 22, 2024
Authored by indoushka

Online Banking System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 21c5ff52ac4e90c5da3505e6a12e81117f3b56db76ac19fc375e8dd30243e7ee
Online Diagnostic Lab Management System 1.0 Arbitrary File Upload
Posted Aug 21, 2024
Authored by indoushka

Online Diagnostic Lab Management System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 978b02141f2137df791b40707a42365e446471161ea7eb4df651cfd5ff222dd8
Biobook Social Networking Site 1.0 Arbitrary File Upload
Posted Aug 20, 2024
Authored by indoushka

Biobook Social Networking Site version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | eea7a63452086fbc6b26395926afd32c8db7ed26cb64e63041d07be948f52e93
Job Castle 1.0 Arbitrary File Upload
Posted Aug 14, 2024
Authored by indoushka

Job Castle version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | f14162d4a77d52793d3dc53ca757b4ad8ff9f17c72b6660e345b95221d53f069
Hotel Management System 1.0 Arbitrary File Upload
Posted Aug 14, 2024
Authored by indoushka

Hotel Management System version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 819229d02bda3fa9cbbbd2bfee66fb703e22843e42837d98eb5585d72f9f8570
Exam Form Submission 1.0 Arbitrary File Upload
Posted Aug 9, 2024
Authored by indoushka

Exam Form Submission version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | a048d71cbc65bedd52d863b70ef7a5bc25146a23473cd113bada7f23c4724417
AccPack Khanepani 1.0 Arbitrary File Upload
Posted Aug 9, 2024
Authored by indoushka

AccPack Khanepani version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 7f16775768ccf1b0c70fe615a79c8c4ceb55b10aae6f67c634cf6177fd5b5fdd
AccPack Cop 1.0 Arbitrary File Upload
Posted Aug 9, 2024
Authored by indoushka

AccPack Cop version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | af527ad287b83f0334f0860648809791a2e32f674065e68516f6c5c957cb9e4d
Open WebUI 0.1.105 File Upload / Path Traversal
Posted Aug 8, 2024
Authored by Jaggar Henry, Sean Segreti | Site korelogic.com

Open WebUI version 0.1.105 suffers from arbitrary file upload and path traversal vulnerabilities.

tags | exploit, arbitrary, vulnerability, file upload
advisories | CVE-2024-6707
SHA-256 | ec5387176f30bac9fa4d3eadc1c952af22cf21e137493ca6d50297eda34a6c34
AccPack Buzz 1.0 Arbitrary File Upload
Posted Jul 31, 2024
Authored by indoushka

AccPack Buzz version 1.0 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 26ba3578925635eec579c27afdcf5dfe641d09db3c89b0df1e695a98b9056176
Edu-Sharing Arbitrary File Upload
Posted Jun 24, 2024
Authored by Kai Zimmermann | Site sec-consult.com

Edu-Sharing suffers from an arbitrary file upload vulnerability. Versions below 8.0.8-RC2, 8.1.4-RC0, and 9.0.0-RC19 are affected.

tags | exploit, arbitrary, file upload
advisories | CVE-2024-28147
SHA-256 | c90a369f9e92e190de24d8035bc4ae4e56c58d29c471e9653ffa0e568fcee57e
Carbon Forum 5.9.0 Cross Site Request Forgery / SQL Injection
Posted Jun 24, 2024
Authored by bRpsd

Carbon Forum version 5.9.0 suffers from access control, cross site request forgery, file upload, outdated library, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, file upload, csrf
SHA-256 | cba504421b68519aaed702319b854c39235fc60743041d75670a496471266424
Apache Solr Backup/Restore API Remote Code Execution
Posted Apr 24, 2024
Authored by jheysel-r7, l3yx | Site metasploit.com

Apache Solr versions 6.0.0 through 8.11.2 and versions 9.0.0 up to 9.4.1 are affected by an unrestricted file upload vulnerability which can result in remote code execution in the context of the user running Apache Solr. When Apache Solr creates a Collection, it will use a specific directory as the classpath and load some classes from it. The backup function of the Collection can export malicious class files uploaded by attackers to the directory, allowing Solr to load custom classes and create arbitrary Java code. Execution can further bypass the Java sandbox configured by Solr, ultimately causing arbitrary command execution.

tags | exploit, java, remote, arbitrary, code execution, file upload
advisories | CVE-2023-50386
SHA-256 | 982c87ed2032bff9e2a889f42db78ed065aa2707c068813f76b1c3875193d49d
GUnet OpenEclass E-learning 3.15 File Upload / Command Execution
Posted Apr 11, 2024
Authored by Georgios Tsimpidas, Frey

GUnet OpenEclass E-learning platform version 3.15 suffers from an unrestricted file upload vulnerability in certbadge.php that allows for remote command execution.

tags | exploit, remote, php, file upload
advisories | CVE-2024-31777
SHA-256 | 87510b61a4bcdb0fdc6c31f4148617866220f4cd5cc391960946f28d1c611747
WordPress Travelscape Theme 1.0.3 Arbitrary File Upload
Posted Apr 8, 2024
Authored by Milad Karimi

WordPress Travelscape theme version 1.0.3 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 8c7f57a620a7f2e630146822105069ce7c8d705a9661a1a56006b6c19ee5ae88
Lektor Static CMS 3.3.10 Arbitrary File Upload / Remote Code Execution
Posted Mar 20, 2024
Authored by kai6u

Lektor Static CMS version 3.3.10 suffers from an arbitrary file upload vulnerability that can be leveraged to achieve remote code execution.

tags | exploit, remote, arbitrary, code execution, file upload
SHA-256 | 12e46eeac4843dfaaf4f61083381648a44692cd6a4aade7ab73a5901f82f2336
WordPress File Upload Cross Site Scripting
Posted Mar 19, 2024
Authored by Faiyaz Ahmad

WordPress File Upload plugin versions prior to 4.23.3 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss, file upload
SHA-256 | 3b846687e4071f8314c772e2348dd5b6d4b6c50cc0acd6fd150c3ad212d8fb7f
CMSMS 2.2.19 Arbitrary File Upload
Posted Jan 3, 2024
Authored by nu11secur1ty

CMSMS version 2.2.19 suffers from an arbitrary file upload vulnerability.

tags | exploit, arbitrary, file upload
SHA-256 | 10d444684a1178256d641dcf6a31e78bdb9b5db129a97ebd890d4e09119b515c
Hospital Management System 4.0 XSS / Shell Upload / SQL Injection
Posted Dec 22, 2023
Authored by Louise Ng, Chris Chan

Hospital Management System versions 4.0 and below suffer from cross site scripting, remote shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, xss, sql injection, file upload
advisories | CVE-2020-26627, CVE-2020-26628, CVE-2020-26629, CVE-2020-26630
SHA-256 | 4c4cb4162e1a493a04ab18896d55ef8649d628f41d3426944382f8e72a0ea4f9
Struts S2-066 File Upload Remote Code Execution
Posted Dec 13, 2023
Authored by Steven Seeley | Site cwiki.apache.org

Apache Struts versions 2.0.0 through 2.3.37 (EOL), 2.5.0 through 2.5.32, and 6.0.0 through 6.3.0 suffer from an issues where an attacker can manipulate file upload parameters to enable a path traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform remote code execution.

tags | advisory, remote, code execution, file upload
advisories | CVE-2023-50164
SHA-256 | 3eabd0d7746d3af616a6a03f2fad7d9609f5c2a795390784bc379146a76826ad
Page 2 of 42
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close