Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-7246

Description

A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.

POC

Reference

- http://packetstormsecurity.com/files/156063/qdPM-9.1-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/156571/qdPM-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/167264/qdPM-9.1-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/168559/qdPM-9.1-Authenticated-Shell-Upload.html

- https://docs.google.com/document/d/13ZZSm0DL1Ie6r_fU5ZdDKGZ4defFqiFXMG--zDo8S10/edit?usp=sharing

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/20142995/nuclei-templates

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/Elsfa7-110/kenzer-templates

- https://github.com/InesMartins31/iot-cves

- https://github.com/Ji82466dx21ohnDavi69no0dinans/awesome-security-vul-llm

- https://github.com/Live-Hack-CVE/CVE-2020-7246

- https://github.com/Mav0y56cgi4rie8clu4e5vrBarnett/awesome-security-vul-llm

- https://github.com/Mr-Tree-S/POC_EXP

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/SexyBeast233/SecBooks

- https://github.com/TobinShields/qdPM9.1_Exploit

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/amessedad/autoexploitGPT

- https://github.com/arafatansari/QDPMSEC

- https://github.com/arafatansari/SecAssignment

- https://github.com/cryptoconman/QDPMSEC

- https://github.com/cryptoconman/SecAssignment

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/j0hn30n/CVE-2020-7246

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lnxcrew/CVE-2020-7246

- https://github.com/lnxcrew/lnxcrew.github.io

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/password520/Penetration_PoC

- https://github.com/pentration/gongkaishouji

- https://github.com/pswalia2u/CVE-2020-7246

- https://github.com/rishaldwivedi/Public_Disclosure

- https://github.com/soosmile/POC

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xu-xiang/awesome-security-vul-llm

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji