7.5
CVSSv2

CVE-2017-7402

Published: 03/04/2017 Updated: 16/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Pixie 1.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via the POST data in an admin/index.php?s=publish&x=filemanager request for a filename with a double extension, such as a .jpg.php file with Content-Type of image/jpeg.

Affected Products

Vendor Product Versions
GetpixiePixie1.04

Exploits

# Exploit Title: File Extension Filter Bypass in File Manager Pixie 104 With Low Privilege # Google Dork: no # Date: 02-April-2017 # Exploit Author: @rungga_reksya, @dvnrcy, @dickysofficial # Vendor Homepage: wwwgetpixiecouk # Software Link: ussoftpedia-secure-downloadcom/dl/44791fdde14260bc7a8d08df65bcd048/58db4b5c/700044699/ ...

Mailing Lists

Pixie version 104 suffers from a remote shell upload vulnerability ...