### [CVE-2015-6967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6967) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php. ### POC #### Reference - http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html - http://seclists.org/fulldisclosure/2015/Sep/5 #### Github - https://github.com/0xConstant/CVE-2015-6967 - https://github.com/0xConstant/ExploitDevJourney - https://github.com/0xkasra/CVE-2015-6967 - https://github.com/0xkasra/ExploitDevJourney - https://github.com/3mpir3Albert/HTB_Nibbles - https://github.com/ARPSyndicate/cvemon - https://github.com/Anekant-Singhai/Exploits - https://github.com/Desm0ndChan/OSCP-cheatsheet - https://github.com/EchoSl0w/CVE - https://github.com/FredBrave/CVE-2015-6967 - https://github.com/dix0nym/CVE-2015-6967 - https://github.com/flex0geek/cves-exploits - https://github.com/gecr07/Nibbles-HTB - https://github.com/nirajmaharz/Hackthebox-nibbles-exploit