Description
Victor CMS 1.0 contains an authenticated file upload vulnerability that allows administrators to upload PHP files with arbitrary content through the user_image parameter. Attackers can upload a malicious PHP shell to the /img/ directory and execute system commands by accessing the uploaded file with a 'cmd' parameter.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Kishan Lal Choudhary
References
www.exploit-db.com/exploits/48490 (ExploitDB-48490)
github.com/VictorAlagwu/CMSsite (Victor CMS Project Repository)
www.vulncheck.com/...cms-authenticated-arbitrary-file-upload (VulnCheck Advisory: Victor CMS 1.0 - Authenticated Arbitrary File Upload)