File Upload vulnerability in BoidCMS v.2.0.0 allows a remote malicious user to execute arbitrary code by adding a GIF header to bypass MIME type checks.
This Metasploit module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS versions 200 and below BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file ...
Exploit for file upload vulnerability in BoidCMS version <=2.0.0
CVE-2023-38836 Exploit
File Upload vulnerability in BoidCMS v200 allows an authenticated attacker to upload a file with dangerous type (CWE-434)
To exploit, an attacker could add a GIF header to bypass MIME type checks
GIF89a;
<?php system($_GET["cmd"]); ?>
Usage
usage: exppy [-h] [-u URL] [-l USER] [-p PASSW