A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
References
Link | Resource |
---|---|
https://github.com/TheHackingRabbi/CVE-2021-42669 | Exploit Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-42671 | Exploit Third Party Advisory |
https://www.sourcecodester.com/php/13115/engineers-online-portal-php.html | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-11-05 13:15
Updated : 2024-02-28 18:48
NVD link : CVE-2021-42669
Mitre link : CVE-2021-42669
CVE.ORG link : CVE-2021-42669
JSON object : View
Products Affected
engineers_online_portal_project
- engineers_online_portal
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type