cve/2015/CVE-2015-2842.md

19 lines
958 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-2842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2842)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Unrestricted file upload vulnerability in go_audiostore.php in the audiostore (Voice Files) upload functionality in GoAutoDial GoAdmin CE 3.x before 3.3-1421902800 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in sounds/.
### POC
#### Reference
- http://packetstormsecurity.com/files/131543/GoAutoDial-SQL-Injection-Command-Execution-File-Upload.html
- https://www.exploit-db.com/exploits/36807/
#### Github
- https://github.com/TarunYenni/GoAutoDial-CE-3.3-Exploit-Authentication-Bypass-Command-Injection