mirror of
https://github.com/0xMarcio/cve.git
synced 2026-03-27 00:50:19 +01:00
1.8 KiB
1.8 KiB
CVE-2015-6967
Description
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.
POC
Reference
- http://packetstormsecurity.com/files/133425/NibbleBlog-4.0.3-Shell-Upload.html
- http://seclists.org/fulldisclosure/2015/Sep/5
Github
- https://github.com/0xConstant/CVE-2015-6967
- https://github.com/0xConstant/ExploitDevJourney
- https://github.com/0xkasra/CVE-2015-6967
- https://github.com/0xkasra/ExploitDevJourney
- https://github.com/3mpir3Albert/HTB_Nibbles
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anekant-Singhai/Exploits
- https://github.com/Desm0ndChan/OSCP-cheatsheet
- https://github.com/EchoSl0w/CVE
- https://github.com/FredBrave/CVE-2015-6967
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/banomaly/CVE-2015-6967
- https://github.com/banomaly/ExploitDevJourney
- https://github.com/cuerv0x/CVE-2015-6967
- https://github.com/dix0nym/CVE-2015-6967
- https://github.com/domian-byte/Nibbles_Walkthrough
- https://github.com/fak3x3r0/My_pentesting_journey
- https://github.com/flex0geek/cves-exploits
- https://github.com/gecr07/Nibbles-HTB
- https://github.com/innocentx0/CVE-2015-6967-EXPLOIT
- https://github.com/mylovemyon/memo
- https://github.com/nirajmaharz/Hackthebox-nibbles-exploit
- https://github.com/zhanpengliu-tencent/medium-cve