Description
Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server.
Problem types
CWE-434: Unrestricted Upload of File with Dangerous Type
Product status
2.5.0
Credits
Ahmet Ümit BAYRAM
References
www.s9y.org/latest
www.exploit-db.com/exploits/52036 (ExploitDB-52036)
docs.s9y.org/ (Vendor Homepage)
www.s9y.org/latest (Software Link)
www.vulncheck.com/...xecution-via-authenticated-media-upload (VulnCheck Advisory: Serendipity 2.5.0 Remote Code Execution via Authenticated Media Upload)