Booked Scheduler 2.7.5 Remote Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 5 Mar 2019.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a file upload vulnerability Booked 2.7.5. In the "Look and Feel" section of the management panel, you can modify the Logo-Favico-CSS files. Upload sections has file extension control except favicon part. You can upload the file with the extension you want through the Favicon field. The file you upload is written to the main directory of the site under the name "custom-favicon". After you upload the php payload to the main directory, the exploit executes the payload and receives a shell.

    Continue reading...
     

Share This Page

Loading...