9
CVSSv2

CVE-2008-5663

Published: 19/12/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 910
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Multiple unrestricted file upload vulnerabilities in Kusaba 1.0.4 and previous versions allow remote authenticated users to execute arbitrary code by uploading a file with an executable extension using (1) load_receiver.php or (2) a shipainter action to paint_save.php, then accessing the uploaded file via a direct request to this file in their user directory.

Vulnerable Product Search on Vulmon Subscribe to Product

kusaba kusaba

Exploits

<!-- 9 Oct 2008 Kusaba <= 104 Remote Code Execution Exploit #2 Sausage <tehsausage@gmailcom> Will work if they have left the load_receiverphp script un-edited After execution: (Yes these are the exact URLs) wwwkusabaimageboard/url/change this to the same value as your KU_ROOTDIRpostphp?pc=print "Hello"; wwwkusa ...
<?php /********************************** 9 Oct 2008 Kusaba <= 104 Remote Code Execution Sausage <tehsausage@gmailcom> After execution: wwwkusabaimageboard/url/kasubaoek/oekakiphp?pc=print "Hello"; wwwkusabaimageboard/url/kasubaoek/oekakiphp?sc=echo Hello **********************************/ $shellname = 'oeka ...