Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42669 PoC — Engineers Online Portal 代码问题漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal 代码问题漏洞 (CVE-2021-42669)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在代码问题漏洞,该漏洞源于在PHP的Sourcecodester Engineers Online Portal中通过dashboard teacher. PHP存在文件上传漏洞。攻击者可利用该漏洞使用-/admin/uploads/php-websh
Description
CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.
Readme
# CVE-2021-42669
CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.

# Technical description:
A unrestricted file upload vulnerability exists in the Engineers Online Portal system. An attacker can leverage this vulnerability in order to get a remote code execution on the affected web server. 
Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. 
By uploading a simple php webshell the attacker can gain remote code execution on the web server. 

Affected components - 

Vulnerable page - teacher_avatar.php

# CVE-2021-42669.py usage - 
```
# Upload a simple webshell to the target machine - 
python CVE-2021-42669.py <target_ip> <target_port> <target_uri> <username> <password>
```

## Example -
```
python CVE-2021-42669.py 127.0.0.1 80 /nia_uoz_monitoring_system/ MyUserName MyPassword
```

# Proof of concept (Poc) - 

![CVE-2021-42669](https://user-images.githubusercontent.com/93016131/140194579-79107b2f-b511-435f-874c-961b4636df9c.gif)

# Refernces - 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42669

https://nvd.nist.gov/vuln/detail/CVE-2021-42669

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/083059ec6a0648ca0bee76d73b780e5807f7da4d ├── [2.6K] CVE-2021-42669.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.