RazorCMS 1.2.1 STABLE - Arbitrary File Upload
Author: i2sec_Hyo jun Oh
type: webapps
platform: php
port:
date_added: 2012-03-08
date_updated: 2012-03-08
verified: 0
codes: OSVDB-80619
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comrazorCMS_core_v1_2_1_STABLE.zip
# Exploit Title: RazorCMS <= 1.2.1 STABLE File Upload Vulnerability
# Google Dork:
# Date: 2012-02-26
# Author: i2sec_Hyo jun Oh
# Software Link: http://www.razorcms.co.uk/archive/core/razorCMS_core_v1_2_1_STABLE.zip
# Version: RazorCMS 1.2.1
# Tested on: Windows XP
Upload a file extension did not check.
Destination
1. user login
2. user upload webshell
3. Run sebshell ----- <host>/datastore/webshell.php