module
Log1 CMS writeInfo() PHP Code Injection
Disclosed | Created |
---|---|
Apr 11, 2011 | May 30, 2018 |
Disclosed
Apr 11, 2011
Created
May 30, 2018
Description
This module exploits the "Ajax File and Image Manager" component that can be
found in log1 CMS. In function.base.php of this component, the 'data' parameter
in writeInfo() allows any malicious user to have direct control of writing data
to file data.php, which results in arbitrary remote code execution.
found in log1 CMS. In function.base.php of this component, the 'data' parameter
in writeInfo() allows any malicious user to have direct control of writing data
to file data.php, which results in arbitrary remote code execution.
Authors
EgiX
Adel SBM
sinn3r sinn3r@metasploit.com
Adel SBM
sinn3r sinn3r@metasploit.com
Platform
PHP
Architectures
php
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.