PlaySMS 1.4 allows remote code execution because PHP code in the name of an uploaded .php file is executed. sendfromfile.php has a combination of Unrestricted File Upload and Code Injection.
References
Link | Resource |
---|---|
http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ | Broken Link Third Party Advisory |
https://www.exploit-db.com/exploits/42003/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44599/ | Exploit Third Party Advisory VDB Entry |
http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ | Broken Link Third Party Advisory |
https://www.exploit-db.com/exploits/42003/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44599/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ - Broken Link, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42003/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/44599/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-05-19 15:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9080
Mitre link : CVE-2017-9080
CVE.ORG link : CVE-2017-9080
JSON object : View
Products Affected
playsms
- playsms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type