Rapid7 Vulnerability & Exploit Database

V-CMS PHP File Upload and Execute

Back to Search

V-CMS PHP File Upload and Execute

Disclosed
11/27/2011
Created
05/30/2018

Description

This module exploits a vulnerability found on V-CMS's inline image upload feature. The problem is due to the inline_image_upload.php file not checking the file type before saving it on the web server. This allows any malicious user to upload a script (such as PHP) without authentication, and then execute it with a GET request. The issue is fixed in 1.1 by checking the extension name. By default, 1.1 only allows jpg, jpeg, png, gif, bmp, but it is still possible to upload a PHP file as one of those extension names, which may still be leveraged in an attack.

Author(s)

  • AutoSec Tools
  • sinn3r <sinn3r@metasploit.com>

Platform

PHP

Architectures

php

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/vcms_upload
msf exploit(vcms_upload) > show targets
    ...targets...
msf exploit(vcms_upload) > set TARGET < target-id >
msf exploit(vcms_upload) > show options
    ...show and set options...
msf exploit(vcms_upload) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;