import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.exploit-db.com/exploits/42044/ | Exploit Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/44598/ | |
| https://www.exploit-db.com/exploits/42044/ | Exploit Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/44598/ | 
Configurations
                    History
                    21 Nov 2024, 03:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.exploit-db.com/exploits/42044/ - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.exploit-db.com/exploits/44598/ - | 
Information
                Published : 2017-05-21 18:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9101
Mitre link : CVE-2017-9101
CVE.ORG link : CVE-2017-9101
JSON object : View
Products Affected
                playsms
- playsms
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
