exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

OpenX banner-edit.php File Upload PHP Code Execution
Posted May 8, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a vulnerability in the OpenX advertising software. In versions prior to version 2.8.2, authenticated users can upload files with arbitrary extensions to be used as banner creative content. By uploading a file with a PHP extension, an attacker can execute arbitrary PHP code. NOTE: The file must also return either "png", "gif", or "jpeg" as its image type as returned from the PHP getimagesize() function.

tags | exploit, arbitrary, php
advisories | CVE-2009-4098
SHA-256 | 2e56b8901b6db7e4ccae093ae10e96fb0dd8d90f34d2fca0bd7b5f5294957b13
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close