Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w75v-hg32-gpp6

Опубликовано: 08 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 10

Описание

MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.

MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.

EPSS

Процентиль: 98%
0.64724
Средний

10 Critical

CVSS4

Дефекты

CWE-434

Связанные уязвимости

nvd
6 месяцев назад

MobileCartly version 1.0 contains an arbitrary file creation vulnerability in the savepage.php script. The application fails to perform authentication or authorization checks before invoking file_put_contents() on attacker-controlled input. An unauthenticated attacker can exploit this flaw by sending crafted HTTP GET requests to savepage.php, specifying both the filename and content. This allows arbitrary file creation within the pages/ directory or any writable path on the server, allowing remote code execution.

EPSS

Процентиль: 98%
0.64724
Средний

10 Critical

CVSS4

Дефекты

CWE-434