Description
Koken CMS 0.22.24 contains a file upload vulnerability that allows authenticated attackers to bypass file extension restrictions by renaming malicious PHP files. Attackers can upload PHP files with system command execution capabilities by manipulating the file upload request through a web proxy and changing the file extension.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
v1n1v131r4
References
www.exploit-db.com/exploits/48706 (ExploitDB-48706)
koken.me/ (Koken CMS Official Homepage)
www.softaculous.com/apps/cms/Koken (Softaculous Koken CMS Software Page)
github.com/...File-Upload-on-Koken-CMS/blob/master/README.md (Researcher PoC)
www.vulncheck.com/advisories/koken-cms-arbitrary-file-upload (VulnCheck Advisory: Koken CMS 0.22.24 - Arbitrary File Upload)