Lucene search

K
packetstormChetanya SharmaPACKETSTORM:166077
HistoryFeb 21, 2022 - 12:00 a.m.

Microweber 1.2.11 Shell Upload

2022-02-2100:00:00
Chetanya Sharma
packetstormsecurity.com
191

0.041 Low

EPSS

Percentile

92.2%

`# Exploit Title: Microweber 1.2.11 - Remote Code Execution (RCE) (Authenticated)  
# Google Dork: NA  
# Date: 02/17/2022  
# Exploit Author: Chetanya Sharma @AggressiveUser  
# Vendor Homepage: https://microweber.org/  
# Software Link: https://github.com/microweber/microweber  
# Version: 1.2.11  
# Tested on: [KALI OS]  
# CVE : CVE-2022-0557  
# Reference : https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8/  
  
# Step To Reproduce  
- Login using Admin Creds.   
- Navigate to User Section then Add/Modify Users  
- Change/Add image of profile and Select a Crafted Image file   
- Crafted image file Aka A image file which craft with PHP CODES for execution   
- File Extension of Crafted File is PHP7 like "Sample.php7"  
  
- Path of Uploaded Crafted SHELL https://localhost/userfiles/media/default/shell.php7  
  
`