module

October CMS Upload Protection Bypass Code Execution

Disclosed
2017-04-25
Created
2019-09-06

Description

This module exploits an Authenticated user with permission to upload and manage media contents can
upload various files on the server. Application prevents the user from
uploading PHP code by checking the file extension. It uses black-list based
approach, as seen in octobercms/vendor/october/rain/src/Filesystem/
Definitions.php:blockedExtensions().
This module was tested on October CMS version v1.0.412 on Ubuntu.

Authors

Anti Räis
Touhid M.Shaikh touhidshaikh22@gmail.com
SecureLayer7.net

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/october_upload_bypass_exec
msf exploit(october_upload_bypass_exec) > show targets
...targets...
msf exploit(october_upload_bypass_exec) > set TARGET < target-id >
msf exploit(october_upload_bypass_exec) > show options
...show and set options...
msf exploit(october_upload_bypass_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.