### [CVE-2012-10049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10049) ![](https://img.shields.io/static/v1?label=Product&message=WebPageTest&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen) ### Description WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw allows remote attackers to upload and execute arbitrary PHP code, resulting in full remote code execution under the web server context. ### POC #### Reference - https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/webpagetest_upload_exec.rb - https://www.exploit-db.com/exploits/19790 - https://www.exploit-db.com/exploits/20173 - https://www.vulncheck.com/advisories/webpagetest-arbitrary-php-file-upload-rce #### Github - https://github.com/fkie-cad/nvd-json-data-feeds