Subscribe via feed.

JobScript Remote Code Execution

Posted by deepcore on May 24, 2016 – 6:29 pm

JobScript suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in ‘/admin-ajax.php’ script thru the ‘name’ and ‘file’ POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with ‘.php’ extension (to bypass the ‘.htaccess’ block rule) that will be stored in ‘/jobmonster/wp-content/uploads/jobmonster/’ directory.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.