AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the Post Image function under the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC | third party advisory exploit |
https://drive.google.com/file/d/1PdF7gTUt_QuU2ObS9YUVew6orHaho-QF/view?usp=sharing | third party advisory exploit |
http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html | exploit vdb entry third party advisory |