[] NeoSense

Papoo 3.x - Upload Images Arbitrary File Upload

Author: RedTeam Pentesting GmbH
type: webapps
platform: php
port: nan
date_added: 2009-08-10 
date_updated: 2014-05-03 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/36006/info

Papoo is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately validate user-supplied input.

An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.


The following command will generate a file with a valid GIF header that runs the 'phpinfo()' function when requested:

$ printf "GIF89a\x01\x00\x01\x00<?php phpinfo();?>" > poc.php