8.8
CVSSv3

CVE-2023-38836

Published: 21/08/2023 Updated: 10/10/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

File Upload vulnerability in BoidCMS v.2.0.0 allows a remote malicious user to execute arbitrary code by adding a GIF header to bypass MIME type checks.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

boidcms boidcms 2.0.0

Exploits

BoidCMS versions 200 and below suffer from a remote shell upload vulnerability ...
This Metasploit module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS versions 200 and below BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file ...

Github Repositories

Exploit for file upload vulnerability in BoidCMS version <=2.0.0

CVE-2023-38836 Exploit File Upload vulnerability in BoidCMS v200 allows an authenticated attacker to upload a file with dangerous type (CWE-434) To exploit, an attacker could add a GIF header to bypass MIME type checks GIF89a; &lt;?php system($_GET["cmd"]); ?&gt; Usage usage: exppy [-h] [-u URL] [-l USER] [-p PASSW