Description
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality to extract them into accessible directories, and execute arbitrary commands through the extracted PHP files.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
2.5.7
Credits
Cakes
References
www.exploit-db.com/exploits/47349 (ExploitDB-47349)
github.com/leefish/filethingie/archive/master.zip (Product Reference)
www.vulncheck.com/...ingie-arbitrary-file-upload-via-ft2-php (VulnCheck Advisory: FileThingie 2.5.7 Arbitrary File Upload via ft2.php)