Webiness Inventory 2.3 suffers from an Arbitrary File upload vulnerability via PHP code in the protected/library/ajax/WsSaveToModel.php logo parameter.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://packetstormsecurity.com/files/149982/Webiness-Inventory-2.9-Shell-Upload.html | third party advisory vdb entry exploit |