← Voltar para CVEs
CVE-2012-10049
N/ADescricao
WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw allows remote attackers to upload and execute arbitrary PHP code, resulting in full remote code execution under the web server context.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/8/2025
Ultima modificacao8/8/2025
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-434
Referencias
https://github.com/catchpoint/WebPageTest(disclosure@vulncheck.com)
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/webpagetest_upload_exec.rb(disclosure@vulncheck.com)
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=26148(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/19790(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/20173(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/webpagetest-arbitrary-php-file-upload-rce(disclosure@vulncheck.com)
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/webpagetest_upload_exec.rb(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.exploit-db.com/exploits/19790(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.exploit-db.com/exploits/20173(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.