Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-39115 PoC — Campcodes Online Matrimonial Website System 代码问题漏洞

Source
Associated Vulnerability
Title:Campcodes Online Matrimonial Website System 代码问题漏洞 (CVE-2023-39115)
Description:Campcodes Online Matrimonial Website System是Campcodes公司的一个在线婚姻网站。 Campcodes Online Matrimonial Website System存在安全漏洞。攻击者利用该漏洞通过恶意SVG文件上传执行代码。
Description
Campcodes Online Matrimonial Website System 3.3 Cross Site Scripting
Readme
# CVE-2023-39115

Description:
Campcodes Online Matrimonial Website System Script v3.3 is vulnerable to an arbitrary file upload vulnerability, potentially allowing attackers to execute arbitrary code on the targeted server. The vulnerability arises from insufficient validation of uploaded files, particularly SVG (Scalable Vector Graphics) files. By exploiting this vulnerability, an attacker can upload a specially crafted SVG file containing malicious code.

Attack Vector:
An attacker can exploit this vulnerability by crafting an SVG file that includes malicious script code, which is executed when the SVG file is processed by the application's upload functionality.

Impact:
Successful exploitation of this vulnerability could lead to arbitrary code execution on the server. This could allow the attacker to take control of the application and potentially the entire server, leading to data breaches, unauthorized access, and further attacks on the underlying infrastructure.

Affected Versions:
Campcodes Online Matrimonial Website System Script v3.3 is confirmed to be affected by this vulnerability. Other versions might also be vulnerable, but this version has been specifically identified.

Mitigation:
To mitigate this vulnerability, the vendor should implement thorough input validation and file type verification checks for uploaded files. Additionally, users are advised to update to a patched version of the software as soon as it becomes available.


File Snapshot

[4.0K] /data/pocs/b8df40e8c5796121fb75fc6e7f072d4fe0c22bba ├── [1.1K] Attack-Vector & PoC └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.