cve/2015/CVE-2015-6967.md

32 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-6967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6967)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.
### POC
#### Reference
- http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html
- http://seclists.org/fulldisclosure/2015/Sep/5
#### Github
- https://github.com/0xConstant/CVE-2015-6967
- https://github.com/0xConstant/ExploitDevJourney
- https://github.com/0xkasra/CVE-2015-6967
- https://github.com/0xkasra/ExploitDevJourney
- https://github.com/3mpir3Albert/HTB_Nibbles
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anekant-Singhai/Exploits
- https://github.com/Desm0ndChan/OSCP-cheatsheet
- https://github.com/EchoSl0w/CVE
- https://github.com/FredBrave/CVE-2015-6967
- https://github.com/dix0nym/CVE-2015-6967
- https://github.com/flex0geek/cves-exploits
- https://github.com/gecr07/Nibbles-HTB
- https://github.com/nirajmaharz/Hackthebox-nibbles-exploit