
12 changes to exploits/shellcodes HMA VPN 5.3 - Unquoted Service Path Cyclades Serial Console Server 3.3.0 - Local Privilege Escalation Microsoft Gaming Services 2.52.13001.0 - Unquoted Service Path WordPress Plugin Perfect Survey - 1.5.1 - SQLi (Unauthenticated) Cab Management System 1.0 - 'id' SQLi (Authenticated) Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated) Cab Management System 1.0 - Remote Code Execution (RCE) (Authenticated) Thinfinity VirtualUI 2.5.41.0 - IFRAME Injection Thinfinity VirtualUI 2.5.26.2 - Information Disclosure WordPress Plugin WP User Frontend 3.5.25 - SQLi (Authenticated) FileCloud 21.2 - Cross-Site Request Forgery (CSRF) Dbltek GoIP - Local File Inclusion
19 lines
No EOL
795 B
Text
19 lines
No EOL
795 B
Text
# Exploit Title: Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)
|
|
# Google Dork: NA
|
|
# Date: 02/17/2022
|
|
# Exploit Author: Chetanya Sharma @AggressiveUser
|
|
# Vendor Homepage: https://microweber.org/
|
|
# Software Link: https://github.com/microweber/microweber
|
|
# Version: 1.2.11
|
|
# Tested on: [KALI OS]
|
|
# CVE : CVE-2022-0557
|
|
# Reference : https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8/
|
|
|
|
# Step To Reproduce
|
|
- Login using Admin Creds.
|
|
- Navigate to User Section then Add/Modify Users
|
|
- Change/Add image of profile and Select a Crafted Image file
|
|
- Crafted image file Aka A image file which craft with PHP CODES for execution
|
|
- File Extension of Crafted File is PHP7 like "Sample.php7"
|
|
|
|
- Path of Uploaded Crafted SHELL https://localhost/userfiles/media/default/shell.php7 |