Clipbucket - Operating System Command Injection

Strike ID:
E17-0ifa1
CVSS:
4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
False Positive:
f
Variants:
1
Year:
2017

Description

This strike exploits a command injection vulnerability in Clipbucket web application. The vulnerability is due to improper input validation of the "file_name" parameter in HTTP requests to "file_uploader.php" script. By exploiting this vulnerability, a remote, unauthenticated attacker can execute arbitrary OS commands on the target server. NOTE: When run in one-arm mode, file_uploader.php script needs to be available at http://[server]/api/file_uploader.php. Test will create a file named "exploited" in the same location as the vulnerable script.

References