Simple College Website 1.0 allows a user to conduct remote code execution via /alumni/admin/ajax.php?action=save_settings when uploading a malicious file using the image upload functionality, which is stored in /alumni/admin/assets/uploads/.
References
Link | Resource |
---|---|
https://dl.packetstormsecurity.net/2010-exploits/simplecollegewebsite10-sqlexec.txt | Exploit Third Party Advisory |
https://github.com/yunaranyancat/poc-dump/blob/main/simplecollegewebsite/sqli_rce.py | Exploit Third Party Advisory |
https://www.sourcecodester.com/php/14548/simple-college-website-using-htmlphpmysqli-source-code.html | Third Party Advisory |
https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-03-31 13:15
Updated : 2024-02-28 18:28
NVD link : CVE-2020-28173
Mitre link : CVE-2020-28173
CVE.ORG link : CVE-2020-28173
JSON object : View
Products Affected
simple_college_project
- simple_college
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type