PlaySMS 1.4 allows remote code execution because PHP code in the name of an uploaded .php file is executed. sendfromfile.php has a combination of Unrestricted File Upload and Code Injection.
                
            References
                    | Link | Resource | 
|---|---|
| http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ | Broken Link Third Party Advisory | 
| https://www.exploit-db.com/exploits/42003/ | Exploit Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/44599/ | Exploit Third Party Advisory VDB Entry | 
| http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ | Broken Link Third Party Advisory | 
| https://www.exploit-db.com/exploits/42003/ | Exploit Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/44599/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 03:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://touhidshaikh.com/blog/poc/playsms-v1-4-rce/ - Broken Link, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/42003/ - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.exploit-db.com/exploits/44599/ - Exploit, Third Party Advisory, VDB Entry | 
Information
                Published : 2017-05-19 15:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9080
Mitre link : CVE-2017-9080
CVE.ORG link : CVE-2017-9080
JSON object : View
Products Affected
                playsms
- playsms
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
