Lucene search

K
packetstormEagle EyePACKETSTORM:179072
HistoryJun 13, 2024 - 12:00 a.m.

Quick CMS 6.7 Shell Upload

2024-06-1300:00:00
Eagle Eye
packetstormsecurity.com
80
quick cms
authenticated
shell upload
eagle eye
window
linux
unfiltered parameter
file upload
savevariables
vendor
database
configuration
request interception
malicious script
extension override

AI Score

7.4

Confidence

Low

`# Title : Authenticated Shell Upload  
# Product : Quick CMS  
# Vendor : https://opensolution.org/  
# Affected Version : 6.7  
# Researcher : Eagle Eye  
# Tested on : Window & Linux  
# Date : 11/06/2024  
# Report : Already contact the vendor but no response  
# Affected path : admin.php , core/common-admin.php, database/config.php  
# Affected function : saveVariables()  
# Description : Unfiltered parameter that post into admin.php?p=settings override any  
$config key value cause to file upload allowed extension overriding  
lead to shell upload.  
# Step to reproduce  
- login at admin.php  
- click setting on right above  
- click save and intercept the request  
- on body parameter, add &allowed_not_image_extensions=php and proceed  
- click Pages and New page from top navbar  
- On the panel, choose Add files  
- And you can upload malicious script with extension php - You may find on path eg: http://website.com/files/shell.php  
`

AI Score

7.4

Confidence

Low