import.php (aka the Phonebook import feature) in PlaySMS 1.4 allows remote code execution via vectors involving the User-Agent HTTP header and PHP code in the name of a file.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/42044/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44598/ | |
https://www.exploit-db.com/exploits/42044/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44598/ |
Configurations
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/42044/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/44598/ - |
Information
Published : 2017-05-21 18:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9101
Mitre link : CVE-2017-9101
CVE.ORG link : CVE-2017-9101
JSON object : View
Products Affected
playsms
- playsms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type