PlaySMS sendfromfile.php Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 8 May 2018.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a code injection vulnerability within an authenticated file upload feature in PlaySMS version 1.4. This issue is caused by improper file name handling in sendfromfile.php file. Authenticated Users can upload a file and rename the file with a malicious payload. This Metasploit module was tested against PlaySMS 1.4 on VulnHub's Dina 1.0 machine and Windows 7.

    Continue reading...
     

Share This Page

Loading...