A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
- http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html
- https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/InesMartins31/iot-cves
- https://github.com/Ji82466dx21ohnDavi69no0dinans/awesome-security-vul-llm
- https://github.com/Live-Hack-CVE/CVE-2020-7246
- https://github.com/Mav0y56cgi4rie8clu4e5vrBarnett/awesome-security-vul-llm
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TobinShields/qdPM9.1_Exploit
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/amessedad/autoexploitGPT
- https://github.com/arafatansari/QDPMSEC
- https://github.com/arafatansari/SecAssignment
- https://github.com/cryptoconman/QDPMSEC
- https://github.com/cryptoconman/SecAssignment
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/huisetiankong478/penetration_poc
- https://github.com/huisetiankong478/poc
- https://github.com/j0hn30n/CVE-2020-7246
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnxcrew/CVE-2020-7246
- https://github.com/lnxcrew/lnxcrew.github.io
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pswalia2u/CVE-2020-7246
- https://github.com/rishaldwivedi/Public_Disclosure
- https://github.com/soosmile/POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xu-xiang/awesome-security-vul-llm
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji