7.5
CVSSv2

CVE-2014-9567

Published: 07/01/2015 Updated: 08/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote malicious users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

projectsend projectsend 156

projectsend projectsend 102

projectsend projectsend 105

projectsend projectsend 375

projectsend projectsend 405

projectsend projectsend 157

projectsend projectsend 561

projectsend projectsend 100

projectsend projectsend 161

projectsend projectsend 180

projectsend projectsend 335

projectsend projectsend 110

projectsend projectsend 155

projectsend projectsend 412

projectsend projectsend 514

Exploits

#!/usr/bin/python # Exploit Title: ProjectSend r-651 File Upload # Date: December 01, 2014 # Exploit Author: Fady Mohamed Osman (Exploit-db id:2986) # Vendor Homepage: wwwprojectsendorg/ # Software Link: wwwprojectsendorg/download/67/ # Version: r-561 # Tested on: Kubuntu 1410 x64 import sys import requests scriptName = sysar ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info={}) super(updat ...