Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11447 PoC — 编号重复

Source
Associated Vulnerability
Title:编号重复 (CVE-2019-11447)
Description:An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
Description
CuteNews Avatar  2.1.2 Remote Code Execution Vulnerability
Readme
# CVE-2019-11447-EXP
CuteNews Avatar  2.1.2 Remote Code Execution Vulnerability

Before run the python script, run the nc command firstly. The default port is 1234.

Then execute exploit.py, follow the tips and input required contents.

![image](https://github.com/khuntor/CVE-2019-11447-EXP/blob/main/img/1.jpg)

![image](https://github.com/khuntor/CVE-2019-11447-EXP/blob/main/img/2.png)
File Snapshot

[4.0K] /data/pocs/b23112845163db59285dbad1109d5c84476dba70 ├── [3.8K] exploit.py ├── [4.0K] img │   ├── [ 17K] 1.jpg │   └── [ 64K] 2.png ├── [ 390] README.md └── [5.4K] testshell.php 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →