Description
2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload executable PHP files by sending multipart form data to managefile.php. Attackers can upload PHP files through the userfile1 parameter with action=upload, which are stored in the files directory and executed by the web server for remote code execution.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Ihsan Sencan
References
www.exploit-db.com/exploits/45878 (ExploitDB-45878)
www.vulncheck.com/...arbitrary-file-upload-via-managefilephp (VulnCheck Advisory: 2-Plan Team 1.0.4 Arbitrary File Upload via managefile.php)