Update documentation/modules/exploit/multi/http/churchcrm_db_restore_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
This commit is contained in:
@@ -8,7 +8,7 @@ This module exploits an authenticated Remote Code Execution (RCE) vulnerability
|
||||
|
||||
The application fails to properly validate the integrity and format of uploaded backup files during the restoration process. Specifically, even when file is identified as malfomed or invalid, it is still writen to a web-accessible directory.
|
||||
|
||||
An autenticated attacker can levrage this behavior to upload a malicious `.htaccess` file to reconfigure the server's directory permissions, followed by a PHP payload. This allow for the execution of arbitrary code under the context of the web server user.
|
||||
An autenticated attacker can leverage this behavior to upload a malicious `.htaccess` file to reconfigure the server's directory permissions, followed by a PHP payload. This allow for the execution of arbitrary code under the context of the web server user.
|
||||
|
||||
- Project Homepage: https://churchcrm.io/
|
||||
- Source Code: https://github.com/ChurchCRM/CRM
|
||||
|
||||
Reference in New Issue
Block a user