[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Roxy Fileman 1.4.4 - Arbitrary File Upload

Author
Tyrell Sassen
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-25109
Category
web applications
Date add
16-06-2016
Platform
php
# Exploit Title: Roxy Fileman <= 1.4.4 Forbidden File Upload Vulnerability
# Google Dork: intitle:"Roxy file manager"
# Date: 15-06-2016
# Exploit Author: Tyrell Sassen
# Vendor Homepage: http://www.roxyfileman.com/
# Software Link: http://www.roxyfileman.com/download.php?f=1.4.4-php
# Version: 1.4.4
# Tested on: PHP
 
1. Description
 
The Roxy File Manager has a configuration setting named FORBIDDEN_UPLOADS,
which keeps a list of forbidden file extensions that the application will
not allow to be uploaded. This configuration setting is also checked when
renaming an existing file to a new file extension.
 
It is possible to bypass this check and rename already uploaded files to
any extension, using the move function as this function does not perform
any checks.
 
 
2. Proof of Concept
 
http://host/fileman/php/movefile.php?f=/Upload/backdoor.jpg&n=/Upload/backdoor.php
 
 
The renamed file will now be accessible at http://host/Upload/backdoor.php

#  0day.today [2024-09-28]  #