Description
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
Problem types
Improper Neutralization of Special Elements in a File Name or Extension (File Upload)
Product status
Credits
emaragkos
References
www.exploit-db.com/exploits/48163 (ExploitDB-48163)
www.openeclass.org/ (Official Vendor Homepage)
download.openeclass.org/files/docs/1.7/CHANGES.txt (Changelog)
www.vulncheck.com/...g-platform-file-upload-extension-bypass (VulnCheck Advisory: GUnet OpenEclass 1.7.3 E-learning platform - File Upload Extension Bypass)