This Metasploit module exploits an Authenticated user with permission to upload and manage media contents can upload various files on the server. Application prevents the user from uploading PHP code by checking the file extension. It uses black-list based approach, as seen in octobercms/vendor/october/rain/src/Filesystem/ Definitions.php:blockedExtensions(). This module was tested on October CMS version version 1.0.412 on Ubuntu.
018cfd6c1eb8529baff5fa0a0a5365e86412dcf24e53e0a9dac7f7b274f80338
Gitea versions 1.7.0 through 1.7.3 suffer from a stored html injection vulnerability.
253ed51f7af489f1307804b4289f3d88966fed3070de63f9f7e892dd2a22ed63
b2evolution CMS versions 6.6.0 through 6.8.10 suffer from a php code execution vulnerability.
18f4539cf4fe17463b3faf5e2e74c177b2bf60a531b9f8efa46e3f91d9e46207
MODX Revolution versions 2.0.1 through 2.5.6 suffer from a remote blind SQL injection vulnerability.
9ca53f1352f8bd1e513b06cdda62e23b39b10558818e68e30de8e25e1cc7f5eb
October CMS version 1.0.412 suffers from access bypass, cross site scripting, code execution, and remote shell upload vulnerabilities.
f133ae1a00c61dc5828a8d5a4a01eaa1cff8d008fd292fc06836a939242285de
Joomla K2 extension versions 2.5.0 through 2.7.1 suffer from cross site request forgery and remote shell upload vulnerabilities.
51360de63be1747db41906a1d00213fd070daf72507686e977bfdec5cc249b1b