JobScript Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 24 May 2016.

  1. Packet Storm

    Packet Storm Guest

    JobScript suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin-ajax.php' script thru the 'name' and 'file' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php' extension (to bypass the '.htaccess' block rule) that will be stored in '/jobmonster/wp-content/uploads/jobmonster/' directory.

    Continue reading...
     

Share This Page

Loading...