Description
WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw allows remote attackers to upload and execute arbitrary PHP code, resulting in full remote code execution under the web server context.
Problem types
CWE-434 Unrestricted Upload of File with Dangerous Type
Product status
* (semver)
Credits
dun
References
www.exploit-db.com/exploits/20173
www.exploit-db.com/exploits/19790
raw.githubusercontent.com/...http/webpagetest_upload_exec.rb
raw.githubusercontent.com/...http/webpagetest_upload_exec.rb
www.exploit-db.com/exploits/19790
www.exploit-db.com/exploits/20173
www.broadcom.com/...enter/attacksignatures/detail?asid=26148
github.com/catchpoint/WebPageTest
www.vulncheck.com/...bpagetest-arbitrary-php-file-upload-rce