Ecommerce-Website v1 was discovered to contain an arbitrary file upload vulnerability via /customer_register.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md | third party advisory exploit |
https://drive.google.com/file/d/1m6rovKb3ZWJ-vbsVlfaZDGmyZ_F13nCf/view?usp=sharing | third party advisory exploit |
http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html | exploit vdb entry third party advisory |