mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
32 lines
1.4 KiB
Markdown
32 lines
1.4 KiB
Markdown
![]() |
### [CVE-2015-6967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6967)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html
|
||
|
- http://seclists.org/fulldisclosure/2015/Sep/5
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xConstant/CVE-2015-6967
|
||
|
- https://github.com/0xConstant/ExploitDevJourney
|
||
|
- https://github.com/0xkasra/CVE-2015-6967
|
||
|
- https://github.com/0xkasra/ExploitDevJourney
|
||
|
- https://github.com/3mpir3Albert/HTB_Nibbles
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Anekant-Singhai/Exploits
|
||
|
- https://github.com/Desm0ndChan/OSCP-cheatsheet
|
||
|
- https://github.com/EchoSl0w/CVE
|
||
|
- https://github.com/FredBrave/CVE-2015-6967
|
||
|
- https://github.com/dix0nym/CVE-2015-6967
|
||
|
- https://github.com/flex0geek/cves-exploits
|
||
|
- https://github.com/gecr07/Nibbles-HTB
|
||
|
- https://github.com/nirajmaharz/Hackthebox-nibbles-exploit
|
||
|
|