6.5
CVSSv2

CVE-2015-6568

Published: 14/04/2017 Updated: 17/09/2017
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 660
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Wolf CMS prior to 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wolfcms wolf cms

Exploits

# Exploit Title : Wolf CMS 082 Arbitrary File Upload To Command Execution # Reported Date : 05-May-2015 # Fixed Date : 10-August-2015 # Exploit Author : Narendra Bhati # CVE ID : CVE-2015-6567 , CVE-2015-6568 # Contact: * Facebook : facebookcom/narendradewsoft *Twitter : twittercom/Naren ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize super( ...